assignment #8 – solutions

42
Assignment #8 – Solutions

Upload: daxia

Post on 22-Feb-2016

70 views

Category:

Documents


0 download

DESCRIPTION

Assignment #8 – Solutions. Problem 1. Each participant selects a random polynomial The joint secret is the sum of the original secrets How are shares of the joint secret formed?. Problem 1. 1. 2. 3. Problem 1. 1. 2. 3. Problem 1. 1. 2. 3. Problem 1. - PowerPoint PPT Presentation

TRANSCRIPT

Assignment #2 Solutions

Assignment #8 SolutionsProblem 13/10/2011Practical Aspects of Modern CryptographyProblem 13/10/2011Practical Aspects of Modern Cryptography123Problem 13/10/2011Practical Aspects of Modern Cryptography123Problem 13/10/2011Practical Aspects of Modern Cryptography123Problem 13/10/2011Practical Aspects of Modern CryptographyProblem 23/10/2011Practical Aspects of Modern CryptographyProblem 23/10/2011Practical Aspects of Modern CryptographyProblem 23/10/2011Practical Aspects of Modern CryptographyGroup ElGamal EncryptionMarch 3, 2011Practical Aspects of Modern Cryptography10Problem 23/10/2011Practical Aspects of Modern CryptographyProblem 33/10/2011Practical Aspects of Modern CryptographyProblem 33/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption Mix3/10/2011Practical Aspects of Modern CryptographyA Verifiable Re-encryption MixProblem 3The challenges for this re-encryption mix can be obtained by feeding all of the intermediate and final ballot sets into a cryptographic hash function such as SHA-1.

The output bits of the hash can be used as the challenge bits in an interactive proof.3/10/2011Practical Aspects of Modern Cryptography