Articles relating to Decisional Diffie-Hellman assumption:
- add section on candidate groups where it is believed to hold,
- general clean up.
Diffie-Hellman key exchange is in bad shape formally
- uses everywhere,
- stuff about prime order subgroups should really go in DDH article.
- do we really need a zillion examples?
- needlessly duplicates all of the prime-order subgroup disclaimer stuff.
ElGamal signature scheme (don't know about this scheme, but the article is very suspicious.)
- uses everywhere
- only mentions computational discrete log problem.
- be sure to maintain consistency with these guys
- needs separate security section
- comments about history of CCA schemes should go in CCA article
- misc TLC
Encryption security definitions:
- needs an actual definition!
- good god, they don't have actual definitions.
- CCA1 and CCA2 do NOT need separate articles.
- what a crappy term
- article also sucks
- Weed out claims of "provable security" that don't mention the computational assumption (or security level achieved, i.e CCA/CPA).
- Try to achieve some uniformity about "cryptosystem" vs "encryption scheme" vs (my least favorite) "encryption algorithm".
- Write Univeral composability
- Secure computation and secure two-party computation do not need a separate article from secure multi-party computation. Also, secure computation uses the phrase "zero-knowledgeness", which makes me want to vomit.