aboutsummaryrefslogtreecommitdiff
path: root/spec/rend-spec-v3/signature-scheme-with-key-blinding-keyblind.md
diff options
context:
space:
mode:
Diffstat (limited to 'spec/rend-spec-v3/signature-scheme-with-key-blinding-keyblind.md')
-rw-r--r--spec/rend-spec-v3/signature-scheme-with-key-blinding-keyblind.md12
1 files changed, 6 insertions, 6 deletions
diff --git a/spec/rend-spec-v3/signature-scheme-with-key-blinding-keyblind.md b/spec/rend-spec-v3/signature-scheme-with-key-blinding-keyblind.md
index d0393dd..8a7b1a2 100644
--- a/spec/rend-spec-v3/signature-scheme-with-key-blinding-keyblind.md
+++ b/spec/rend-spec-v3/signature-scheme-with-key-blinding-keyblind.md
@@ -1,12 +1,12 @@
<a id="rend-spec-v3.txt-A"></a>
-# Appendix A: Signature scheme with key blinding [KEYBLIND]
+# Appendix A: Signature scheme with key blinding \[KEYBLIND\]
<a id="rend-spec-v3.txt-A.1"></a>
## Key derivation overview
-As described in [IMD:DIST] and [SUBCRED] above, we require a "key
+As described in \[IMD:DIST\] and \[SUBCRED\] above, we require a "key
blinding" system that works (roughly) as follows:
There is a master keypair (sk, pk).
@@ -43,10 +43,10 @@ We propose the following scheme for key blinding, based on Ed25519.
(This is an ECC group, so remember that scalar multiplication is the
trapdoor function, and it's defined in terms of iterated point
-addition. See the Ed25519 paper [Reference ED25519-REFS] for a fairly
+addition. See the Ed25519 paper \[Reference ED25519-REFS\] for a fairly
clear writeup.)
-Let B be the ed25519 basepoint as found in section 5 of [ED25519-B-REF]:
+Let B be the ed25519 basepoint as found in section 5 of \[ED25519-B-REF\]:
```text
B = (15112221349535400772501151409588531511454012693041857206046113283949847762202,
@@ -99,6 +99,6 @@ Verifying the signature: Check whether SB = R+hash(R,A',M)A'.
This boils down to regular Ed25519 with key pair (a', A').
```
-See [KEYBLIND-REFS] for an extensive discussion on this scheme and
-possible alternatives. Also, see [KEYBLIND-PROOF] for a security
+See \[KEYBLIND-REFS\] for an extensive discussion on this scheme and
+possible alternatives. Also, see \[KEYBLIND-PROOF\] for a security
proof of this scheme.