Alice calculate g ^ and sent to Bob
, Bob calculates (g ^) ^ b = g ^ {AB} and sent to Carroll
Carroll calculates (g ^ {AB}) ^ c = g ^. {abc} and used it as her secret
Bob calculate g ^ b and sent to Carroll
Carroll calculates (g ^ b) ^ c = g ^ {BC} and sent to Alice,
Alice. Space Calculator (g ^ {BC}) ^ = g ^ {} = BCA g ^ {abc} and used it as her secret
Carol calculate g ^ c and sent to Alice
Alice calculations (eg. ^ c) ^ = g ^ {} CA and sends it to Bob
, Bob calculates (g ^ {CA}) ^ b = g ^ {} taxi g = ^ {abc} and used it as his secret
wiretapping. have been able to see the g ^ g ^ b g ^ C, G ^ {AB} g ^ {AC} and g ^ {BC} but can not be used for any combination of these to reproduce g ^ {abc. } to extend this mechanism to the group at large, two fundamental principles must be followed: start with a "blank" that consists of only gram confidentiality is made by adding the current value to raise the profile of the participants. Every once in any order (for example, first raised the yield on its own public key of the participants) , any middle. (With the exponent N-1, where N is the number of participants in the group) may be disclosed to the public. But the last (Exponential all have to use) as a secret shared and hence will not be. Publicly Therefore, each user will have to get their copy of the secret key using their own personal past. (Otherwise, there is a way to engage the past to communicate the final recipient is a participant of the past have turned that very seriously. Secrets of the group wanted to protect) these principles from the various options available for selecting the participants to contribute to a solution of the easiest and most obvious is to arrange a meeting. participants in a circle and there is no key, no spin around the circle until finally all that was important to engage the participants N (end its owners), and each participant has contributed with a key. No (End of their own), but this must attend all the action. exponentiations No Split
การแปล กรุณารอสักครู่..