applied cryptography - protocols, algorithms, and source code in c

Alice wants to convince bob that she knows carols key

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: freely cheat. 23.8 One-Way Accumulators There is a simple one-way accumulator function [116] (see Section 4.12): A(xi, y) = xi-1y mod n Previous Table of Contents Next Products | Contact Us | About Us | Privacy | Ad Info | Home Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Read EarthWeb's privacy statement. To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) Go! Keyword Brief Full Advanced Search Search Tips (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Search this book: Go! Previous Table of Contents Next ----------- The numbers n (n is the product of two primes) and x0 must be agreed upon in advance. Then, the accumulation of y1 , y2 , and y3 would be ((x0 y1 mod n)y2 mod n)y3 mod n This computation is independent of the order of y1, y2 , and y3. 23.9 All-or-Nothing Disclosure of Secrets This protocol allows multiple parties (at least two are required for the protocol to work) to buy individual secrets from a single seller (see Section 4.13) [1374,1175]. First, here’s a definition. Take two bit strings, x and y. The fixed bit index (FBI) of x and y are the bits where the ith bit of x equals the ith bit of y. For example: x = 110101001011 y = 101010000110 FBI(x, y) = {1, 4, 5, 11} (We’re reading the bits from right to left, with the right-most bit as zero.) Now, here’s the protocol. Alice is the seller. Bob and Carol are buyers. Alice has k n-bit secrets: S1, S2 , ..., Sk. Bob wants to buy secret Sb; Carol wants to buy secret Sc. (1) Alice generates a public-key/private-key key pair and tells Bob (but not Carol) the public key. She generates another public-key/private-key key pair and tells Carol (but not Bob) the public key. (2) Bo...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online