On Mon, Nov 13, 2017 at 08:26:04PM -0700, Sean Bowe wrote:
> > Q: What exactly happens if one participant fails to destroy that secret
> > and/or
> > inputs a low-entropy secret? What about N participants?
> >
> > The paper states that "We show that security holds even if an adversary has
> >
On Mon, Nov 13, 2017 at 02:16:18PM -0700, Sean Bowe via zapps-wg wrote:
> There are three ways that a participants' toxic waste can be compromised:
>
> 1. the participant is dishonest and keeps the toxic waste around
> 2. the toxic waste is extracted from the machine, either from a side
> channel