You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Formally stating what adversaries you expect to prevent what sorts of attacks is a really important part of designing any cryptographic system. When examining SIV, I found it difficult to understand what the actual threat model is, and when SIV / the observers / the cryptography were intended to prevent some attack by some adversary with what power, and what steps a voter was supposed to take in the event that they see an issue.
One way of thinking about this would be to enumerate what actors are supposed to do what in the system, and what assumptions the system makes about the maliciousness of each. This is standard practice in cryptography, and, without one, I really can’t provide a great analysis of the system.
Originally posted by @mspecter in #195
The text was updated successfully, but these errors were encountered: