正在加载图片...
secret splitting Algorithm: Assume Trent wishes to protect the message m: Trent generates a random bit string r, the same leng th Trent computes mer=s Trent gives Alice r Trent gives Bob s Each of the pieces is called a shadow. To reconstruct m alice and bob xor their shadows together. If r is truly random, the system is perfectly secure(OTP). To extend the scheme to n people, generate n random bit strings e. g. m er⊕st〓u3 secret splitting Algorithm: Assume Trent wishes to protect the message m: Trent generates a random bit string r, the same length m. Trent computes m  r = s Trent gives Alice r Trent gives Bob s • Each of the pieces is called a shadow. • To reconstruct m, Alice and Bob XOR their shadows together. • If r is truly random, the system is perfectly secure (OTP). • To extend the scheme to n people, generate n random bit strings e.g. m  r  s  t = u
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有