Click Here! |
|
|
To access the contents, click the chapter and section titles.
Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)
23.6 Computing with Encrypted DataThe Discrete Logarithm Problem There is a large prime, p, and a generator, g. Alice has a particular value for x, and wants to know e, such that
This is a hard problem, and Alice lacks the computational power to compute the result. Bob has the power to solve the problemhe represents the government, or a large computing organization, or whatever. Heres how Bob can do it without Alice revealing x [547,4]:
Similar protocols for the quadratic residuosity problem and for the primitive root problem are in [3,4]. (See also Section 4.8.) 23.7 Fair Coin FlipsThe following protocols allow Alice and Bob to flip a fair coin over a data network (see Section 4.9) [194]. This is an example of flipping a coin into a well (see Section 4.10). At first, only Bob knows the result of the coin toss and tells it to Alice. Later, Alice may check to make sure that Bob told her the correct outcome of the toss. Coin Flipping Using Square Roots Coin-flip subprotocol:
Verification subprotocol:
Alice has no way of knowing r, so her guess is real. She only tells Bob one bit of her guess in step (4) to prevent Bob from getting both x' and y'. If Bob has both of those numbers, he can change r after step (4). Coin Flipping Using Exponentiation Modulo p Exponentiation modulo a prime number, p, is used as a one-way function in this protocol [1306]: Coin-flip subprotocol:
Verification subprotocol:
For Alice to cheat, she has to know two integers, x and x', such that hx ≡tx' (mod p). If she knew those values,she would be able to calculate:
These are hard problems. Alice would be able to do this if she knew logt h, but Bob chooses h and t in step (2). Alice has no other recourse except to try to compute the discrete logarithm. Alice could also attempt to cheat by choosing an x that is not relatively prime to p -1, but Bob will detect that in step (6). Bob can cheat if h and t are not primitive in GF(p), but Alice can easily check that after step (2) because she knows the prime factorization of p -1. One nice thing about this protocol is that if Alice and Bob want to flip multiple coins, they can use the same values for p, h, and t. Alice just generates a new x, and the protocol continues from step (3). Coin Flipping Using Blum Integers Blum integers can be used in a coin-flipping protocol.
It is crucial that n be a Blum integer. Otherwise, Alice may be able to find an x'0 such that x'02 mod n =x0 2 mod n =x1 , where x'0 is also a quadratic residue. If x0 were even and x'0 were odd (or vice versa), Alice could freely cheat. 23.8 One-Way AccumulatorsThere is a simple one-way accumulator function [116] (see Section 4.12):
|
Products | Contact Us | About Us | Privacy | Ad Info | Home
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-1999 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.
|