亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 05-06.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Advanced Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=05//-->
<!--PAGES=114-117//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="05-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>There is a trick that makes BOB&#146;s chance of cheating even smaller. In step (4), ALICE randomly chooses <I>n</I>/2 of the documents to challenge, and BOB sends her the appropriate blinding factors in step (5). In step (7), ALICE multiplies together all of the unchallenged documents and signs the mega-document. In step (8), BOB strips off all the blinding factors. ALICE&#146;s signature is acceptable only if it is a valid signature of the product of <I>n</I>/2 identical documents. To cheat BOB has to be able to guess exactly which subset ALICE will challenge; the odds are much smaller than the odds of guessing which one document ALICE won&#146;t challenge.</P>
<P>BOB has another way to cheat. He can generate two different documents, one that ALICE is willing to sign and one that ALICE is not. Then he can find two different blinding factors that transform each document into the same blinded document. That way, if ALICE asks to examine the document, BOB gives her the blinding factor that transforms it into the benign document. If ALICE doesn&#146;t ask to see the document and signs it, he uses the blinding factor that transforms it into the malevolent document. While this is theoretically possible, the mathematics of the particular algorithms involved make the odds of BOB&#146;s being able to find such a pair negligibly small. In fact, it can be made as small as the odds of Bob being able to produce the signature on an arbitrary message himself. This issue is discussed further in Section 23.12.</P>
<P><FONT SIZE="+1"><B><I>Patents</I></B></FONT></P>
<P>Chaum has patents for several flavors of blind signatures (see Table 5.1).
</P>
<H3><A NAME="Heading5"></A><FONT COLOR="#000077">5.4 Identity-Based Public-Key Cryptography</FONT></H3>
<P>Alice wants to send a secure message to Bob. She doesn&#146;t want to get his public key from a key server; she doesn&#146;t want to verify some trusted third party&#146;s signature on his public-key certificate; and she doesn&#146;t even want to store Bob&#146;s public key on her own computer. She just wants to send him a secure message.
</P>
<P><B>Identity-based cryptosystems</B>, sometimes called Non-Interactive Key Sharing (NIKS) systems, solve this problem [1422]. Bob&#146;s public key is based on his name and network address (or telephone number, or physical street address, or whatever). With normal public-key cryptography, Alice needs a signed certificate that associates Bob&#146;s public key with his identity. With identity-based cryptography, Bob&#146;s public key <I>is</I> his identity. This is a really cool idea, and about as ideal as you can get for a mail system: If Alice knows Bob&#146;s address, she can send him secure mail. It makes the cryptography about as transparent as possible.</P>
<P>The system is based on Trent issuing private keys to users based on their identity. If Alice&#146;s private key is compromised, she has to change some aspect of her identity to get another one. A serious problem is designing a system in such a way that a collusion of dishonest users cannot forge a key.</P>
<P>A lot of work has been done on the mathematics of these sorts of schemes&#151;most of it in Japan&#151;which turn out to be infuriatingly complicated to make secure. Many of the proposed solutions involve Trent choosing a random number for each user&#151;in my opinion this defeats the real point of the system. Some of the algorithms discussed in Chapters 19 and 20 can be identity-based. For details, algorithms, and cryptanalysis, see [191,1422,891,1022,1515,1202,1196,908,692,674,1131,1023,1516,1536,1544,63,<BR>1210,314,313,1545,1539,1543,933,1517,748,1228]. An algorithm that does not rely on any random numbers is [1035]. The system discussed in [1546,1547,1507] is insecure against a chosen-public-key attack; so is the system proposed as NIKS-TAS [1542,1540,1541,993,375,1538]. Honestly, nothing proposed so far is both practical and secure.</P>
<TABLE WIDTH="100%"><TR>
<TH CAPTION ALIGN="CENTER" COLSPAN="3">TABLE 5.1<BR>Chaum&#146;s Blind Signature Patents
<TR>
<TD COLSPAN="3"><HR>
<TR>
<TH WIDTH="25%" ALIGN="LEFT">U.S. PATENT #
<TH WIDTH="15%" ALIGN="LEFT">DATE
<TH WIDTH="60%" ALIGN="LEFT">TITLE
<TR>
<TD COLSPAN="3"><HR>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">4,759,063
<TD VALIGN="TOP" ALIGN="LEFT">7/19/88
<TD VALIGN="TOP" ALIGN="LEFT">Blind Signature Systems [323]
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">4,759,064
<TD VALIGN="TOP" ALIGN="LEFT">7/19/88
<TD VALIGN="TOP" ALIGN="LEFT">Blind Unanticipated Signature Systems [324]
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">4,914,698
<TD VALIGN="TOP" ALIGN="LEFT">3/3/90
<TD VALIGN="TOP" ALIGN="LEFT">One-Show Blind Signature Systems [326]
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">4,949,380
<TD VALIGN="TOP" ALIGN="LEFT">8/14/90
<TD VALIGN="TOP" ALIGN="LEFT">Returned-Value Blind Signature Systems [328]
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">4,991,210
<TD VALIGN="TOP" ALIGN="LEFT">2/5/91
<TD VALIGN="TOP" ALIGN="LEFT">Unpredictable Blind Signature Systems [331]
<TR>
<TD COLSPAN="3"><HR>
<TR>
</TABLE>
<H3><A NAME="Heading6"></A><FONT COLOR="#000077">5.5 Oblivious Transfer</FONT></H3>
<P>Cryptographer Bob is desperately trying to factor a 500-bit number, <I>n</I>. He knows it&#146;s the product of five 100-bit numbers, but nothing more. (This is a problem. If he can&#146;t recover the key he&#146;ll have to work overtime and he&#146;ll miss his weekly mental poker game with Alice.)</P>
<P>What do you know? Here comes Alice now:</P>
<BLOCKQUOTE><P>&#147;I happen to know one factor of the number,&#148; she says, &#147;and I&#146;ll sell it to you for $100. That&#146;s a dollar a bit.&#148; To show she&#146;s serious, she uses a bit-commitment scheme and commits to each bit individually.
</P>
<P>Bob is interested, but has only $50. Alice is unwilling to lower her price and offers to sell Bob half the bits for half the price. &#147;It&#146;ll save you a considerable amount of work,&#148; she says.</P>
<P>&#147;But how do I know that your number is actually a factor of <I>n?</I> If you show me the number and let me verify that it is a factor, then I will agree to your terms,&#148; says Bob.</P>
<P>They are at an impasse. Alice cannot convince Bob that her number is a factor of <I>n</I> without revealing it, and Bob is unwilling to buy 50 bits of a number that could very well be worthless.</P>
</BLOCKQUOTE><P>This story, stolen from Joe Kilian [831], introduces the concept of <B>oblivious transfer</B>. Alice transmits a group of messages to Bob. Bob receives some subset of those messages, but Alice has no idea which ones he receives. This doesn&#146;t completely solve the problem, however. After Bob has received a random half of the bits, Alice has to convince him that the bits she sent are part of a factor of <I>n</I>, using a zero-knowledge proof.</P>
<P>In the following protocol, Alice will send Bob one of two messages. Bob will receive one, and Alice will not know which.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice generates two public-key/private-key key pairs, or four keys in all. She sends both public keys to Bob.
<DD><B>(2)</B>&nbsp;&nbsp;Bob chooses a key in a symmetric algorithm (DES, for example). He chooses one of Alice&#146;s public keys and encrypts his DES key with it. He sends the encrypted key to Alice without telling her which of her public keys he used to encrypt it.
<DD><B>(3)</B>&nbsp;&nbsp;Alice decrypts Bob&#146;s key twice, once with each of her private keys. In one of the cases, she uses the correct key and successfully decrypts Bob&#146;s DES key. In the other case, she uses the wrong key and only manages to generate a meaningless pile of bits that nonetheless look like a random DES key. Since she does not know the correct plaintext, she has no idea which is which.
<DD><B>(4)</B>&nbsp;&nbsp;Alice encrypts both of her messages, each with a different one of the DES keys she generated in the previous step (one real and one meaningless) and sends both of them to Bob.
<DD><B>(5)</B>&nbsp;&nbsp;Bob gets one of Alice&#146;s messages encrypted with the proper DES key and the other one encrypted with the gibberish DES key. When Bob decrypts each of them with his DES key, he can read one of them; the other just looks like gibberish to him.
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="05-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩电影在线免费| 亚洲成av人片在线观看无码| 色婷婷一区二区| 青青草原综合久久大伊人精品 | 精品久久人人做人人爰| 不卡视频一二三| 男男成人高潮片免费网站| 国产精品不卡一区| 精品三级av在线| 在线免费观看成人短视频| 国产99久久久久| 日本成人在线看| 亚洲一二三四区| 亚洲欧美影音先锋| 久久综合99re88久久爱| 51精品国自产在线| 91蜜桃视频在线| 国产成人一区在线| 蓝色福利精品导航| 日本亚洲三级在线| 亚洲一区在线播放| 亚洲日本一区二区三区| 国产日韩亚洲欧美综合| 欧美不卡一区二区三区四区| 欧美日韩高清一区二区不卡| 色94色欧美sute亚洲13| 99视频国产精品| 粉嫩嫩av羞羞动漫久久久| 精品综合免费视频观看| 日韩电影在线看| 视频一区二区国产| 天天操天天综合网| 日韩精品国产欧美| 日韩激情一二三区| 亚洲成人先锋电影| 午夜精品久久久久久久久久久 | 国产一区二区三区四区在线观看| 亚洲成av人**亚洲成av**| 亚洲欧美日韩小说| 亚洲色图清纯唯美| 亚洲三级免费观看| 亚洲精品国产品国语在线app| 国产精品欧美综合在线| 中文一区二区在线观看| 美女网站一区二区| 中文字幕在线视频一区| 国产欧美日韩在线| 中文字幕第一区二区| 日本一区二区免费在线观看视频| 国产亚洲欧洲997久久综合| 精品对白一区国产伦| 精品对白一区国产伦| 国产欧美中文在线| 亚洲少妇30p| 一区二区三区高清在线| 亚洲国产欧美一区二区三区丁香婷| 午夜精品影院在线观看| 男男视频亚洲欧美| 国产一区二区在线免费观看| 国产成人av电影在线播放| 成人精品视频一区| 91福利区一区二区三区| 91精品在线麻豆| 26uuu成人网一区二区三区| 中文字幕av在线一区二区三区| 中文字幕欧美日韩一区| 亚洲视频小说图片| 午夜精品免费在线| 国产一区二区免费视频| 99精品久久99久久久久| 欧美色精品天天在线观看视频| 制服视频三区第一页精品| 欧美精品一区二区三区蜜桃视频| 国产精品福利一区二区| 亚洲综合一区二区三区| 久久精品理论片| 91在线观看污| 欧美丰满高潮xxxx喷水动漫| 国产日韩欧美激情| 亚洲电影一级片| 国产在线精品一区二区夜色| 91视频在线观看| 日韩午夜小视频| 亚洲天堂成人网| 久久狠狠亚洲综合| 色老汉一区二区三区| 日韩精品一区二区三区在线| 中文字幕亚洲区| 美女性感视频久久| 日本韩国精品一区二区在线观看| 欧美一区永久视频免费观看| 国产精品入口麻豆原神| 日韩专区欧美专区| 9人人澡人人爽人人精品| 欧美一区二区三区人| 国产精品无人区| 日韩不卡一区二区三区| av亚洲精华国产精华| 欧美本精品男人aⅴ天堂| 亚洲蜜臀av乱码久久精品 | 日韩av电影天堂| 成人网页在线观看| 精品久久久久香蕉网| 亚洲国产婷婷综合在线精品| 国产精品资源在线观看| 欧美一区二区三区视频| 亚洲综合丁香婷婷六月香| 国产精品自拍一区| 欧美一区在线视频| 亚洲一区二区三区视频在线播放| 丁香另类激情小说| 欧美sm极限捆绑bd| 亚洲成人黄色影院| 一本大道av伊人久久综合| 国产精品午夜久久| 色狠狠综合天天综合综合| 久久久久综合网| 日本不卡的三区四区五区| 色哟哟国产精品免费观看| 国产欧美日韩视频一区二区 | 从欧美一区二区三区| 日韩一级精品视频在线观看| 一区二区三区高清| 91视频91自| 中文字幕日韩一区二区| 国产一区二区免费在线| 日韩女优电影在线观看| 五月天婷婷综合| 欧美在线不卡视频| 亚洲综合小说图片| 91成人在线精品| 一区二区三区免费看视频| 色综合欧美在线视频区| 中文字幕一区二区三区蜜月| 成人性生交大片免费看视频在线| 久久九九久精品国产免费直播| 精品一区二区在线视频| 日韩美女视频在线| 久久精品国产亚洲一区二区三区| 欧美精品aⅴ在线视频| 日韩精品久久久久久| 日韩一区二区免费在线电影| 蜜臀av性久久久久蜜臀aⅴ四虎 | 欧美国产日韩在线观看| 国产成人午夜精品5599| 国产女人18水真多18精品一级做| 国产精品一区二区视频| 国产视频视频一区| 成人av电影在线观看| 亚洲乱码精品一二三四区日韩在线| 97精品国产97久久久久久久久久久久 | 老司机精品视频线观看86| 欧美xfplay| 国产精品一区二区91| 国产欧美一区二区三区在线看蜜臀 | 欧美韩国日本一区| 91浏览器在线视频| 亚洲午夜免费电影| 日韩三级精品电影久久久| 国产经典欧美精品| 亚洲天堂福利av| 欧美狂野另类xxxxoooo| 美脚の诱脚舐め脚责91| 亚洲国产精品成人久久综合一区 | 欧美一区二区三区视频免费 | caoporm超碰国产精品| 一区二区三区美女| 欧美一级淫片007| 成人精品免费视频| 亚洲国产成人高清精品| 久久一留热品黄| 日本道色综合久久| 老司机精品视频线观看86| 国产精品不卡在线观看| 在线不卡免费av| 国产成人免费高清| 亚洲国产婷婷综合在线精品| 精品女同一区二区| 91视视频在线直接观看在线看网页在线看 | 欧美一区二区三区在线电影| 欧美日韩国产成人在线免费| 久久99国产精品麻豆| 日本一区二区久久| 欧美三日本三级三级在线播放| 六月丁香综合在线视频| 中文字幕一区二区三区在线播放| 欧美美女bb生活片| 国产成人精品免费看| 午夜伊人狠狠久久| 国产精品欧美久久久久一区二区| 欧美视频中文字幕| 国产成人午夜精品影院观看视频 | 成人h精品动漫一区二区三区| 亚洲国产三级在线| 国产欧美一区二区三区在线看蜜臀 | 91精品免费在线观看| 成人黄色软件下载| 久久国产麻豆精品| 亚洲图片欧美色图| 国产精品嫩草99a|