12.05.2013 Views

Protocolos Criptográficos - CryptULL

Protocolos Criptográficos - CryptULL

Protocolos Criptográficos - CryptULL

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CSV: Esquema de Ben-Or,<br />

Goldwasser y Wigderson<br />

Ejemplo: k=1, t=2, w=3,<br />

El repartidor escoge p(x,y)=1+2x+3y y reparte<br />

f 1 (y)=p(1,y)=3+3y, g 1 (x)=p(1,i)=4+2x, t.q. f 1 (1)=g 1 (1)=6<br />

f 2 (y)=p(2,y)=5+3y, g 2 (x)=p(2,i)=7+2x, t.q. f 2 (2)=g 2 (2)=11<br />

f 3 (y)=p(3,y)=7+3y, g 3 (x)=p(3,i)=10+2x, t.q. f 3 (3)=g 3 (3)=16<br />

Si 1º y 2º participantes se intercambian sombras:<br />

comprueban f 1 (2)=g 2 (1)=s 12 =9<br />

reconstruyen el secreto k=1 a partir de {k+a=3, k+2a=5} ó de<br />

{k+b=4, k+2b=7}<br />

Criptografía-ULL

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!