Changes To Experiment: Chainsignature
Not logged in

Changes to "Experiment: Chainsignature" between 2019-03-24 14:44:54 and 2019-03-24 14:46:03

    30     30   
    31     31   
    32     32   
    33     33   
    34     34   
    35     35   
    36     36   
           37  +
           38  +
    37     39   
    38     40   </pre>
    39     41   
    40     42   <p>The M_n must be included to the signature calculation x.blob to make sure
    41     43   that an eavesdropper can not reuse the signature for signing its own message.
    42     44   To make eavesdropping and hijacking more difficult, different messages might be
    43     45   sent through different channels.&nbsp;</p>
................................................................................
    67     69   scheme is usable with non-cooperative anonymity.</p>
    68     70   
    69     71   <p><br>
    70     72   </p>
    71     73   
    72     74   <h1>Similar Ideas and Projects</h1>
    73     75   
    74         -<p>The obvious source of inspiration is the Bitcoin. Some other inspiration
    75         -sources are:</p>
           76  +<p>The obvious source of inspiration is the Bitcoin. Some other related ideas
           77  +and projects are:</p>
    76     78   
    77     79   <p></p>
    78     80   <ul>
    79     81   <li>a&nbsp;<a href="https://blog.cryptographyengineering.com/2018/04/07/hash-based-signatures-an-illustrated-primer/">2018_04_07
    80     82   blog post</a>&nbsp;<i>(<a href="https://archive.is/zLTyw">archival copy</a>,
    81     83   <a href="./ainfo/5c129af665b94a2c">local copy</a>)</i> by Matthew Green;</li>
    82     84   <li>Merkle trees and the&nbsp;Lamport One-Time Signature;</li>
    83     85   </ul>
    84     86   
    85     87   <p></p>
    86     88   
    87     89   <p><br>
    88     90   </p>