亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? 05-07.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號(hào):
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Advanced Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=05//-->
<!--PAGES=117-119//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="05-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Bob now has one of the two messages from Alice and Alice does not know which one he was able to read successfully. Unfortunately, if the protocol stopped here it would be possible for Alice to cheat. Another step is necessary.
</P>
<DL>
<DD><B>(6)</B>&nbsp;&nbsp;After the protocol is complete and both possible results of the transfer are known, Alice must give Bob her private keys so that he can verify that she did not cheat. After all, she could have encrypted the same message with both keys in step (4).
</DL>
<P>At this point, of course, Bob can figure out the second message.
</P>
<P>The protocol is secure against an attack by Alice because she has no way of knowing which of the two DES keys is the real one. She encrypts them both, but Bob only successfully recovers one of them&#151;until step (6). It is secure against an attack by Bob because, before step (6), he cannot get Alice&#146;s private keys to determine the DES key that the other message was encrypted in. This may still seem like nothing more than a more complicated way to flip coins over a modem, but it has extensive implications when used in more complicated protocols.</P>
<P>Of course, nothing stops Alice from sending Bob two completely useless messages: &#147;Nyah Nyah&#148; and &#147;You sucker.&#148; This protocol guarantees that Alice sends Bob one of two messages; it does nothing to ensure that Bob wants to receive either of them.</P>
<P>Other oblivious transfer protocols are found in the literature. Some of them are noninteractive, meaning that Alice can publish her two messages and Bob can learn only one of them. He can do this on his own; he doesn&#146;t have to communicate with Alice [105].</P>
<P>No one really cares about being able to do oblivious transfer in practice, but the notion is an important building block for other protocols. Although there are many types of oblivious transfer&#151;I have two secrets and you get one; I have <I>n</I> secrets and you get one; I have one secret which you get with probability 1/2; and so on&#151;they are all equivalent [245,391,395].</P>
<H3><A NAME="Heading7"></A><FONT COLOR="#000077">5.6 Oblivious Signatures</FONT></H3>
<P>Honestly, I can&#146;t think of a good use for these, but there are two kinds [346]:
</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;Alice has <I>n</I> different messages. Bob can choose one of the <I>n</I> messages for Alice to sign, and Alice will have no way of knowing which one she signed.
<DD><B>2.</B>&nbsp;&nbsp;Alice has one message. Bob can choose one of <I>n</I> keys for Alice to use in signing the message, and Alice will have no way of knowing which key she used.
</DL>
<P>It&#146;s a neat idea; I&#146;m sure it has a use somewhere.
</P>
<H3><A NAME="Heading8"></A><FONT COLOR="#000077">5.7 Simultaneous Contract Signing</FONT></H3>
<P><B><I>Contract Signing with an Arbitrator</I></B></P>
<P>Alice and Bob want to enter into a contract. They&#146;ve agreed on the wording, but neither wishes to sign unless the other signs as well. Face to face, this is easy: Both sign together. Over a distance, they could use an arbitrator.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice signs a copy of the contract and sends it to Trent.
<DD><B>(2)</B>&nbsp;&nbsp;Bob signs a copy of the contract and sends it to Trent.
<DD><B>(3)</B>&nbsp;&nbsp;Trent sends a message to both Alice and Bob indicating that the other has signed the contract.
<DD><B>(4)</B>&nbsp;&nbsp;Alice signs two copies of the contract and sends them to Bob.
<DD><B>(5)</B>&nbsp;&nbsp;Bob signs both copies of the contract, keeps one for himself, and sends the other to Alice.
<DD><B>(6)</B>&nbsp;&nbsp;Alice and Bob both inform Trent that they each have a copy of the contract signed by both of them.
<DD><B>(7)</B>&nbsp;&nbsp;Trent tears up his two copies of the contract with only one signature each.
</DL>
<P>This protocol works because Trent prevents either of the parties from cheating. If Bob were to refuse to sign the contract in step (5), Alice could appeal to Trent for a copy of the contract already signed by Bob. If Alice were to refuse to sign in step (4), Bob could do the same. When Trent indicates that he received both contracts in step (3), both Alice and Bob know that the other is bound by the contract. If Trent does not receive both contracts in steps (1) and (2), he tears up the one he received and neither party is bound.
</P>
<P><FONT SIZE="+1"><B><I>Simultaneous Contract Signing without an Arbitrator (Face-to-Face)</I></B></FONT></P>
<P>If Alice and Bob were sitting face-to-face, they could sign the contract this way [1244]:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice signs the first letter of her name and passes the contract to Bob.
<DD><B>(2)</B>&nbsp;&nbsp;Bob signs the first letter of his name and passes the contract to Alice.
<DD><B>(3)</B>&nbsp;&nbsp;Alice signs the second letter of her name and passes the contract to Bob.
<DD><B>(4)</B>&nbsp;&nbsp;Bob signs the second letter of his name and passes the contract to Alice.
<DD><B>(5)</B>&nbsp;&nbsp;This continues until both Alice and Bob have signed their entire names.
</DL>
<P>If you ignore the obvious problem with this protocol (Alice has a longer name than Bob), it works just fine. After signing only one letter, Alice knows that no judge will bind her to the terms of the contract. But the letter is an act of good faith, and Bob responds with a similar act of good faith.
</P>
<P>After each party has signed several letters, a judge could probably be convinced that both parties had signed the contract. The details are murky, though. Surely they are not bound after only the first letter; just as surely they are bound after they sign their entire names. At what point in the protocol do they become bound? After signing one-half of their names? Two-thirds of their names? Three-quarters?</P>
<P>Since neither Alice nor Bob is certain of the exact point at which she or he is bound, each has at least some fear that she or he is bound throughout the protocol. At no point can Bob say: &#147;You signed four letters and I only signed three. You are bound but I am not.&#148; Bob has no reason not to continue with the protocol. Furthermore, the longer they continue, the greater the probability that a judge will rule that they are bound. Again, there is no reason not to continue with the protocol. After all, they both wanted to sign the contract; they just didn&#146;t want to sign before the other one.</P>
<P><FONT SIZE="+1"><B><I>Simultaneous Contract Signing without an Arbitrator (Not Face-to-Face)</I></B></FONT></P>
<P>This protocol uses the same sort of uncertainty [138]. Alice and Bob alternate taking baby steps toward signing until both have signed.
</P>
<P>In the protocol, Alice and Bob exchange a series of signed messages of the form: &#147;I agree that with probability <I>p</I>, I am bound by this contract.&#148;</P>
<P>The recipient of this message can take it to a judge and, with probability <I>p</I>, the judge will consider the contract to be signed.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice and Bob agree on a date by which the signing protocol should be completed.
<DD><B>(2)</B>&nbsp;&nbsp;Alice and Bob decide on a probability difference that they are willing to live with. For example, Alice might decide that she is not willing to be bound with a greater probability than 2 percent over Bob&#146;s probability. Call Alice&#146;s difference <I>a;</I> call Bob&#146;s difference <I>b</I>.
<DD><B>(3)</B>&nbsp;&nbsp;Alice sends Bob a signed message with <I>p</I> = <I>a</I>.
<DD><B>(4)</B>&nbsp;&nbsp;Bob sends Alice a signed message with <I>p</I> = <I>a</I> &#43; <I>b</I>.
<DD><B>(5)</B>&nbsp;&nbsp;Let <I>p</I> be the probability of the message Alice received in the previous step from Bob. Alice sends Bob a signed message with <I>p&#180;</I> = <I>p</I> &#43; <I>a</I> or 1, whichever is smaller.
<DD><B>(6)</B>&nbsp;&nbsp;Let <I>p</I> be the probability of the message Bob received in the previous step from Alice. Bob sends Alice a signed message with <I>p&#180;</I> = <I>p</I> &#43; <I>b</I> or 1, whichever is smaller.
<DD><B>(7)</B>&nbsp;&nbsp;Alice and Bob continue alternating steps (5) and (6) until both have received messages with <I>p</I> = 1 or until the date agreed to in step (1) has passed.
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="05-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本乱人伦一区| 亚洲制服欧美中文字幕中文字幕| 91在线播放网址| 国产成人a级片| 国产成人欧美日韩在线电影| 麻豆91精品视频| 蜜桃在线一区二区三区| 美腿丝袜亚洲三区| 九九九精品视频| 国产精品一二三区在线| 国产成人精品在线看| 国产丶欧美丶日本不卡视频| 国产精品 日产精品 欧美精品| 国产综合久久久久久久久久久久| 经典一区二区三区| 99在线视频精品| 国产精品综合av一区二区国产馆| 26uuu欧美| 国产成人精品免费网站| 国产成人丝袜美腿| 欧美中文字幕一区二区三区 | 国产一区二区三区香蕉| 国产黑丝在线一区二区三区| 97久久精品人人澡人人爽| 日本高清不卡视频| 色综合天天天天做夜夜夜夜做| 国产.欧美.日韩| 欧美四级电影网| 久久婷婷成人综合色| 欧美岛国在线观看| 日本一区二区免费在线观看视频| 亚洲色图欧洲色图| 午夜久久久影院| 成人精品电影在线观看| 91麻豆免费视频| 欧美精品日韩综合在线| 国产女同互慰高潮91漫画| 亚洲老司机在线| 久久精品久久综合| 日本久久电影网| 91精品在线免费观看| 亚洲欧美一区二区视频| 久久精品免费看| 欧美亚洲国产一区在线观看网站| 国产午夜亚洲精品午夜鲁丝片| 亚洲影视在线观看| 国产白丝精品91爽爽久久 | 成人免费高清在线| 日韩一区国产二区欧美三区| 亚洲欧美日韩在线播放| 国产九色sp调教91| 日韩精品在线网站| 首页亚洲欧美制服丝腿| 91成人免费在线视频| 国产亚洲成av人在线观看导航| 偷拍自拍另类欧美| 色婷婷综合久久| 亚洲国产经典视频| 蜜桃精品在线观看| 欧美日韩在线一区二区| 亚洲美女视频在线| av电影在线观看一区| 国产女人18水真多18精品一级做| 日韩中文字幕麻豆| 欧美系列亚洲系列| 亚洲福利视频一区| a美女胸又www黄视频久久| 精品欧美一区二区久久| 蜜桃视频第一区免费观看| 在线观看91视频| 成人欧美一区二区三区1314| 成人免费视频视频| 中文字幕一区av| 99久久久无码国产精品| 成人欧美一区二区三区小说| 成人高清免费观看| 欧美精品一区二区三区在线| 国产综合久久久久久鬼色| 亚洲精品一区二区三区在线观看| 午夜久久久久久| 欧美成人女星排名| 久久精品国产免费| 久久久亚洲国产美女国产盗摄| 国产精品99久久不卡二区| 国产拍揄自揄精品视频麻豆| 不卡的av中国片| 亚洲欧美日韩国产综合在线| 欧美色精品天天在线观看视频| 亚洲综合网站在线观看| 色综合av在线| 日韩激情一区二区| 久久综合国产精品| av午夜一区麻豆| 亚洲成人www| 久久亚洲综合av| 99久久国产免费看| 视频在线观看91| 国产三级三级三级精品8ⅰ区| 波多野洁衣一区| 亚洲电影一区二区| 日韩免费看的电影| 国产麻豆一精品一av一免费| 亚洲品质自拍视频| 日韩一二三四区| av在线免费不卡| 日本午夜精品视频在线观看| 国产亚洲精品7777| 欧美日韩aaaaaa| jvid福利写真一区二区三区| 亚洲成人av福利| 中文字幕免费不卡| 欧美精品在欧美一区二区少妇| 国产永久精品大片wwwapp| 中文字幕一区二区三区在线观看| 欧美亚洲高清一区| 蜜桃一区二区三区在线观看| 亚洲男人天堂av| 久久久国产午夜精品| 欧美日韩国产影片| a级高清视频欧美日韩| 久久99精品视频| 亚洲成人av中文| 亚洲人成人一区二区在线观看| 欧美mv和日韩mv的网站| 欧美性极品少妇| 99精品欧美一区二区蜜桃免费 | 午夜激情综合网| 国产精品成人免费在线| 日韩精品专区在线影院重磅| 欧美视频在线一区| 成人激情免费网站| 国产麻豆成人精品| 看片网站欧美日韩| 日韩av电影天堂| 午夜欧美电影在线观看| 一区二区视频在线看| 这里只有精品视频在线观看| 粉嫩久久99精品久久久久久夜 | 欧美激情综合在线| 91麻豆精品国产91久久久使用方法| 91网址在线看| eeuss鲁片一区二区三区在线看| 国产裸体歌舞团一区二区| 日本午夜一本久久久综合| 亚洲国产美女搞黄色| 亚洲综合久久久久| 一区二区不卡在线播放| 国产精品久久久久久久裸模| 中文一区二区完整视频在线观看| 这里是久久伊人| 91麻豆精品国产91| 4438成人网| 精品国产一区二区三区久久久蜜月| 日韩一级片在线观看| 欧美一区二区女人| 日韩精品专区在线影院重磅| 久久综合九色综合久久久精品综合| 欧美电影免费提供在线观看| 欧美本精品男人aⅴ天堂| 精品免费一区二区三区| 欧美电影精品一区二区| 日韩欧美国产一区二区三区| 精品奇米国产一区二区三区| 日韩一区二区免费在线观看| 欧美mv和日韩mv国产网站| 久久久精品黄色| 亚洲女厕所小便bbb| 亚洲444eee在线观看| 奇米在线7777在线精品| 韩国欧美国产一区| 成人av网站大全| 欧美日韩一区国产| 精品国产免费一区二区三区四区| 国产午夜三级一区二区三| 亚洲色图另类专区| 亚洲电影第三页| 国内精品嫩模私拍在线| 成人av网站免费| 欧美中文字幕不卡| 欧美电影免费提供在线观看| 最新久久zyz资源站| 天天做天天摸天天爽国产一区| 精彩视频一区二区| 色呦呦国产精品| 精品日产卡一卡二卡麻豆| 国产精品国模大尺度视频| 午夜影院在线观看欧美| 国产成人精品在线看| 欧美日韩国产精品成人| 欧美激情在线一区二区| 亚洲a一区二区| 国产精品1区二区.| 欧美高清精品3d| 久久久另类综合| 亚洲va欧美va人人爽午夜| 国产黄人亚洲片| 欧美v亚洲v综合ⅴ国产v| 亚洲三级在线观看| 国产成人免费xxxxxxxx| 日韩欧美国产wwwww|