SLIDE 1
Theory of Computation Chapter 12: Cryptography
Guan-Shieng Huang
- Dec. 20, 2006
Theory of Computation Chapter 12: Cryptography Guan-Shieng Huang - - PowerPoint PPT Presentation
Theory of Computation Chapter 12: Cryptography Guan-Shieng Huang Dec. 20, 2006 0-0 Introduction Alice wants to communicate with Bob secretely. x Alice Bob John y=E ( e,x ) y Alice Bob y ??? John Assumption The encryption
1
2
3
4
1 k ≤ |f(x)| ≤ |x|k for some k > 0;
5
6
7
8
9
10
11
12
2 .
13
14
15
16
17
18
1 2|x| ;
1 2|x| for any
19
20
21
22
i) according to
i = π(χ(i)) for i ∈ V . That is, yi = (2xi + bi)ei mod piqi
i = (2x′ i + b′ i)ei mod piqi where 0 ≤ xi, x′ i ≤ piqi 2 .
i) for each node i ∈ V to Bob.
i
23
i, bj, and b′ j.
i = bjb′ j.
24