Added todo

This commit is contained in:
= 2019-12-15 03:08:08 +01:00
parent 0e1bd75301
commit a96217d24e

View File

@ -129,6 +129,7 @@ h_i =
\end{cases} \end{cases}
$$ $$
\adv{B} then sets $\alpha = y_0 \cdot a^{n+1}$. $PK$ is then defined as the scheme dictates where the only oddity is $e(g,g)^\alpha$, which can be computed as $e(g^a,g^{a^{n}})^{y_0}$ due to the definition of $\alpha$. $PK$ is sent to \adv{A}. \adv{B} then sets $\alpha = y_0 \cdot a^{n+1}$. $PK$ is then defined as the scheme dictates where the only oddity is $e(g,g)^\alpha$, which can be computed as $e(g^a,g^{a^{n}})^{y_0}$ due to the definition of $\alpha$. $PK$ is sent to \adv{A}.
% TODO: Finish this proof
\section{Implementation of Schemes} \section{Implementation of Schemes}
\subsection{Identity-Based Encryption} \subsection{Identity-Based Encryption}