Comment by rapnie
3 hours ago
Note that there is a broken link to "great paper" in:
> These techniques are described in a great paper whose title I’ve stolen for this section.
3 hours ago
Note that there is a broken link to "great paper" in:
> These techniques are described in a great paper whose title I’ve stolen for this section.
I believe they were attempting to link to https://eprint.iacr.org/2006/454 a paper titled How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication.