HOW TO GENERATE AND EXCHANGE SECRETS.

3.4kCitations
Citations of this article
420Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A tool for controlling the knowledge transfer process in cryptographic protocol design is introduced and used to solve a general class of problems that include most of the two-party cryptographic problems in the literature. Specifically, it is shown how two parties A and B can interactively generate a random integer N equals p multiplied by q such that its secret (i. e. , the prime factors p, q) is hidden from either party individually but is recoverable jointly if desired. This can be utilized to give a protocol for two parties with private values i and j to compute any polynomial computable functions f(i,j) and g(i,j) with minimal knowledge transfer and a strong fairness property. As a special case, A and B can exchange a pair of secrets S//A , S//B in such a way that S//A becomes computable by B when and only when S//B becomes computable by A.

Cite

CITATION STYLE

APA

Yao, A. C. C. (1986). HOW TO GENERATE AND EXCHANGE SECRETS. In Annual Symposium on Foundations of Computer Science (Proceedings) (pp. 162–167). IEEE. https://doi.org/10.1109/sfcs.1986.25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free