翻訳と辞書
Words near each other
・ Trunk (software)
・ Trunk Archive
・ Trunk Boiz
・ Trunk Cay, United States Virgin Islands
・ Trunk deck ship
・ Trunk Funk – The Best of The Brand New Heavies
・ Trunk Island, Bermuda
・ Trunk Line
・ Trunk Line Bridge No. 1
・ Trunk Line Bridge No. 237
・ Trunk Monkey
・ Trunk Music (novel)
・ Trunk Muzik 0-60
・ Trunk Muzik Returns
・ Trunk prefix
Trunk protocol
・ Trunk Records
・ Trunk road
・ Trunk road agency
・ Trunk roads in Ireland
・ Trunk shot
・ Trunk show
・ Trunk Space
・ Trunk to Cairo
・ Trunk Train
・ Trunk versus toll telephony
・ Trunked radio system
・ Trunkelsberg
・ Trunkey Creek, New South Wales
・ Trunki


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Trunk protocol : ウィキペディア英語版
Trunk protocol

The trunk protocol is a thought experiment involving a trunk or suitcase with two locks on it that can perform secure transactions using a public shipping service. It has the advantage of being concrete and without requiring a knowledge of mathematics or computer science.〔The concept is self evident, but it is not known who invented it.〕
^ The Trunk Protocol
*Alice wishes to send something to Bob.
*Alice has a trunk with two hasps on it.
*Alice places the item into the trunk and puts her lock on a hasp and locks it.
*Alice sends the trunk via railway express to Bob.
*Bob puts his lock onto the second hasp and locks it.
*Bob sends the trunk back to Alice via railway express.
*Alice removes her lock and returns the trunk to Bob.
*Bob removes his lock and takes the item out of the trunk.
The trunk protocol can be turned into a mathematical protocol by using any commutative encryption function EK(M), meaning that EK(EK
*
(M)) = EK
*
(EK(M)) for any two keys K, K
* and message M. For example, EK(M) = MK (mod p), where p is a 500-bit prime. The commutativity is related to the fact that the locks on the trunk can be removed in any order, regardless of the order in which they were attached. The security of the function EK(M) = MK (mod p) is based on the well known difficulty of computing the Discrete logarithm when the prime p is large.
The trunk protocol can be used to implement a commitment scheme. For example, we can use it to implement coin flipping over a telephone.
^ Protocol for coin flipping over a telephone
*Alice flips a coin.
*Alice writes the outcome, either "heads" or "tails" on a card.
*Alice places the card into her trunk and locks one hasp.
*She sends the trunk to Bob.
*Bob receives the trunk, locks the second hasp, and sends the trunk back to Alice.
*Bob flips a coin and tells Alice the outcome, either "heads" or "tails" over the telephone.
*Alice removes her lock and returns the trunk to Bob.
*Bob removes his lock, opens the trunk, and removes and reads Alice's card.
*If Alice's coin flip, as revealed by her card, agrees with Bob's coin flip she wins.
==See also==
Three-pass protocol

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Trunk protocol」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.