SlideShare a Scribd company logo
Suppose Bob sends an encrypted document to Alice. To be verifiable, Alice must be able to
convince herself that Bob sent the encrypted document. To be non-forgeable, Alice must be able
to convince herself that only Bob could have sent the encrypted document Alice must be able to
convince someone else that only Bob could have sent the document. To illustrate the latter
distinction, suppose Bob and Alice share a secret key, and they are the only ones in the world
who know the key. If Alice receives a document that was encrypted with the key, and knows that
she did not encrypt the document herself, then the document is known to be verifiable and non-
forgeable (assuming a suitably strong encryption system was used). However, Alice can not
convince someone else that Bob must have sent the document, since in fact Alice knew the key
herself and could have encrypted/sent the document.
Solution
Suppose Bob sends an encrypted document to Alice. To be verifiable, Alice must be able to
convince herself that Bob sent the encrypted document. To be non-forgeable, Alice must be able
to convince herself that only Bob could have sent the encrypted document Alice must be able to
convince someone else that only Bob could have sent the document. To illustrate the latter
distinction, suppose Bob and Alice share a secret key, and they are the only ones in the world
who know the key. If Alice receives a document that was encrypted with the key, and knows that
she did not encrypt the document herself, then the document is known to be verifiable and non-
forgeable (assuming a suitably strong encryption system was used). However, Alice can not
convince someone else that Bob must have sent the document, since in fact Alice knew the key
herself and could have encrypted/sent the document.

More Related Content

More from Lalkamal2

Negative control plate with no DNA transforms competent cells withou.pdf
Negative control plate with no DNA transforms competent cells withou.pdfNegative control plate with no DNA transforms competent cells withou.pdf
Negative control plate with no DNA transforms competent cells withou.pdf
Lalkamal2
 
Modifications highlighted in bold lettersDropOutStack.javaim.pdf
Modifications highlighted in bold lettersDropOutStack.javaim.pdfModifications highlighted in bold lettersDropOutStack.javaim.pdf
Modifications highlighted in bold lettersDropOutStack.javaim.pdf
Lalkamal2
 
Message types used by the DHCP boot sequenceop Message type.h.pdf
Message types used by the DHCP boot sequenceop Message type.h.pdfMessage types used by the DHCP boot sequenceop Message type.h.pdf
Message types used by the DHCP boot sequenceop Message type.h.pdf
Lalkamal2
 
Law of conservation of matter(mass)In any closed system subjected .pdf
Law of conservation of matter(mass)In any closed system subjected .pdfLaw of conservation of matter(mass)In any closed system subjected .pdf
Law of conservation of matter(mass)In any closed system subjected .pdf
Lalkamal2
 
It is a unit of measurement for the amount of substance.The mole is .pdf
It is a unit of measurement for the amount of substance.The mole is .pdfIt is a unit of measurement for the amount of substance.The mole is .pdf
It is a unit of measurement for the amount of substance.The mole is .pdf
Lalkamal2
 
In insurance, the term risk pooling refers to the spreading of f.pdf
In insurance, the term risk pooling refers to the spreading of f.pdfIn insurance, the term risk pooling refers to the spreading of f.pdf
In insurance, the term risk pooling refers to the spreading of f.pdf
Lalkamal2
 
Some CO is Added The Pressure of CH4 and H2O will.pdf
                     Some CO is Added The Pressure of CH4 and H2O will.pdf                     Some CO is Added The Pressure of CH4 and H2O will.pdf
Some CO is Added The Pressure of CH4 and H2O will.pdf
Lalkamal2
 
dasSolutiondas.pdf
dasSolutiondas.pdfdasSolutiondas.pdf
dasSolutiondas.pdf
Lalkamal2
 
Comments Figures are not properly numbered. Further signal of figur.pdf
Comments Figures are not properly numbered. Further signal of figur.pdfComments Figures are not properly numbered. Further signal of figur.pdf
Comments Figures are not properly numbered. Further signal of figur.pdf
Lalkamal2
 
Change the value of jug1 and jug 2 accordingly. 1 File WaterJugBSF.j.pdf
Change the value of jug1 and jug 2 accordingly. 1 File WaterJugBSF.j.pdfChange the value of jug1 and jug 2 accordingly. 1 File WaterJugBSF.j.pdf
Change the value of jug1 and jug 2 accordingly. 1 File WaterJugBSF.j.pdf
Lalkamal2
 
Balance sheetBalance sheet is the statement of financial position .pdf
Balance sheetBalance sheet is the statement of financial position .pdfBalance sheetBalance sheet is the statement of financial position .pdf
Balance sheetBalance sheet is the statement of financial position .pdf
Lalkamal2
 
Answer BaSO4K+ is always soluble because it is an alkaline metal..pdf
Answer BaSO4K+ is always soluble because it is an alkaline metal..pdfAnswer BaSO4K+ is always soluble because it is an alkaline metal..pdf
Answer BaSO4K+ is always soluble because it is an alkaline metal..pdf
Lalkamal2
 
Answer is B because he copied the member A and say that he is innoce.pdf
Answer is B because he copied the member A and say that he is innoce.pdfAnswer is B because he copied the member A and say that he is innoce.pdf
Answer is B because he copied the member A and say that he is innoce.pdf
Lalkamal2
 
A nephron consists of a renal corpuscle and a renal tubule. So the a.pdf
A nephron consists of a renal corpuscle and a renal tubule. So the a.pdfA nephron consists of a renal corpuscle and a renal tubule. So the a.pdf
A nephron consists of a renal corpuscle and a renal tubule. So the a.pdf
Lalkamal2
 
30). e). All of theseDifferent biotechnological methods such as ge.pdf
30). e). All of theseDifferent biotechnological methods such as ge.pdf30). e). All of theseDifferent biotechnological methods such as ge.pdf
30). e). All of theseDifferent biotechnological methods such as ge.pdf
Lalkamal2
 
1) surrounds the meninges and CNSAllows the nutrients to pass from.pdf
1) surrounds the meninges and CNSAllows the nutrients to pass from.pdf1) surrounds the meninges and CNSAllows the nutrients to pass from.pdf
1) surrounds the meninges and CNSAllows the nutrients to pass from.pdf
Lalkamal2
 
1. Sternum.Bone by which ribs are attached on frontal side .2. R.pdf
1. Sternum.Bone by which ribs are attached on frontal side .2. R.pdf1. Sternum.Bone by which ribs are attached on frontal side .2. R.pdf
1. Sternum.Bone by which ribs are attached on frontal side .2. R.pdf
Lalkamal2
 
-Included in the capital account are a. No short term assets are i.pdf
-Included in the capital account are a. No short term assets are i.pdf-Included in the capital account are a. No short term assets are i.pdf
-Included in the capital account are a. No short term assets are i.pdf
Lalkamal2
 
(3,-4)Solution(3,-4).pdf
(3,-4)Solution(3,-4).pdf(3,-4)Solution(3,-4).pdf
(3,-4)Solution(3,-4).pdf
Lalkamal2
 
C++ Program to Implement Doubly Linked List #includei.pdf
  C++ Program to Implement Doubly Linked List  #includei.pdf  C++ Program to Implement Doubly Linked List  #includei.pdf
C++ Program to Implement Doubly Linked List #includei.pdf
Lalkamal2
 

More from Lalkamal2 (20)

Negative control plate with no DNA transforms competent cells withou.pdf
Negative control plate with no DNA transforms competent cells withou.pdfNegative control plate with no DNA transforms competent cells withou.pdf
Negative control plate with no DNA transforms competent cells withou.pdf
 
Modifications highlighted in bold lettersDropOutStack.javaim.pdf
Modifications highlighted in bold lettersDropOutStack.javaim.pdfModifications highlighted in bold lettersDropOutStack.javaim.pdf
Modifications highlighted in bold lettersDropOutStack.javaim.pdf
 
Message types used by the DHCP boot sequenceop Message type.h.pdf
Message types used by the DHCP boot sequenceop Message type.h.pdfMessage types used by the DHCP boot sequenceop Message type.h.pdf
Message types used by the DHCP boot sequenceop Message type.h.pdf
 
Law of conservation of matter(mass)In any closed system subjected .pdf
Law of conservation of matter(mass)In any closed system subjected .pdfLaw of conservation of matter(mass)In any closed system subjected .pdf
Law of conservation of matter(mass)In any closed system subjected .pdf
 
It is a unit of measurement for the amount of substance.The mole is .pdf
It is a unit of measurement for the amount of substance.The mole is .pdfIt is a unit of measurement for the amount of substance.The mole is .pdf
It is a unit of measurement for the amount of substance.The mole is .pdf
 
In insurance, the term risk pooling refers to the spreading of f.pdf
In insurance, the term risk pooling refers to the spreading of f.pdfIn insurance, the term risk pooling refers to the spreading of f.pdf
In insurance, the term risk pooling refers to the spreading of f.pdf
 
Some CO is Added The Pressure of CH4 and H2O will.pdf
                     Some CO is Added The Pressure of CH4 and H2O will.pdf                     Some CO is Added The Pressure of CH4 and H2O will.pdf
Some CO is Added The Pressure of CH4 and H2O will.pdf
 
dasSolutiondas.pdf
dasSolutiondas.pdfdasSolutiondas.pdf
dasSolutiondas.pdf
 
Comments Figures are not properly numbered. Further signal of figur.pdf
Comments Figures are not properly numbered. Further signal of figur.pdfComments Figures are not properly numbered. Further signal of figur.pdf
Comments Figures are not properly numbered. Further signal of figur.pdf
 
Change the value of jug1 and jug 2 accordingly. 1 File WaterJugBSF.j.pdf
Change the value of jug1 and jug 2 accordingly. 1 File WaterJugBSF.j.pdfChange the value of jug1 and jug 2 accordingly. 1 File WaterJugBSF.j.pdf
Change the value of jug1 and jug 2 accordingly. 1 File WaterJugBSF.j.pdf
 
Balance sheetBalance sheet is the statement of financial position .pdf
Balance sheetBalance sheet is the statement of financial position .pdfBalance sheetBalance sheet is the statement of financial position .pdf
Balance sheetBalance sheet is the statement of financial position .pdf
 
Answer BaSO4K+ is always soluble because it is an alkaline metal..pdf
Answer BaSO4K+ is always soluble because it is an alkaline metal..pdfAnswer BaSO4K+ is always soluble because it is an alkaline metal..pdf
Answer BaSO4K+ is always soluble because it is an alkaline metal..pdf
 
Answer is B because he copied the member A and say that he is innoce.pdf
Answer is B because he copied the member A and say that he is innoce.pdfAnswer is B because he copied the member A and say that he is innoce.pdf
Answer is B because he copied the member A and say that he is innoce.pdf
 
A nephron consists of a renal corpuscle and a renal tubule. So the a.pdf
A nephron consists of a renal corpuscle and a renal tubule. So the a.pdfA nephron consists of a renal corpuscle and a renal tubule. So the a.pdf
A nephron consists of a renal corpuscle and a renal tubule. So the a.pdf
 
30). e). All of theseDifferent biotechnological methods such as ge.pdf
30). e). All of theseDifferent biotechnological methods such as ge.pdf30). e). All of theseDifferent biotechnological methods such as ge.pdf
30). e). All of theseDifferent biotechnological methods such as ge.pdf
 
1) surrounds the meninges and CNSAllows the nutrients to pass from.pdf
1) surrounds the meninges and CNSAllows the nutrients to pass from.pdf1) surrounds the meninges and CNSAllows the nutrients to pass from.pdf
1) surrounds the meninges and CNSAllows the nutrients to pass from.pdf
 
1. Sternum.Bone by which ribs are attached on frontal side .2. R.pdf
1. Sternum.Bone by which ribs are attached on frontal side .2. R.pdf1. Sternum.Bone by which ribs are attached on frontal side .2. R.pdf
1. Sternum.Bone by which ribs are attached on frontal side .2. R.pdf
 
-Included in the capital account are a. No short term assets are i.pdf
-Included in the capital account are a. No short term assets are i.pdf-Included in the capital account are a. No short term assets are i.pdf
-Included in the capital account are a. No short term assets are i.pdf
 
(3,-4)Solution(3,-4).pdf
(3,-4)Solution(3,-4).pdf(3,-4)Solution(3,-4).pdf
(3,-4)Solution(3,-4).pdf
 
C++ Program to Implement Doubly Linked List #includei.pdf
  C++ Program to Implement Doubly Linked List  #includei.pdf  C++ Program to Implement Doubly Linked List  #includei.pdf
C++ Program to Implement Doubly Linked List #includei.pdf
 

Recently uploaded

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

Suppose Bob sends an encrypted document to Alice. To be verifiable, .pdf

  • 1. Suppose Bob sends an encrypted document to Alice. To be verifiable, Alice must be able to convince herself that Bob sent the encrypted document. To be non-forgeable, Alice must be able to convince herself that only Bob could have sent the encrypted document Alice must be able to convince someone else that only Bob could have sent the document. To illustrate the latter distinction, suppose Bob and Alice share a secret key, and they are the only ones in the world who know the key. If Alice receives a document that was encrypted with the key, and knows that she did not encrypt the document herself, then the document is known to be verifiable and non- forgeable (assuming a suitably strong encryption system was used). However, Alice can not convince someone else that Bob must have sent the document, since in fact Alice knew the key herself and could have encrypted/sent the document. Solution Suppose Bob sends an encrypted document to Alice. To be verifiable, Alice must be able to convince herself that Bob sent the encrypted document. To be non-forgeable, Alice must be able to convince herself that only Bob could have sent the encrypted document Alice must be able to convince someone else that only Bob could have sent the document. To illustrate the latter distinction, suppose Bob and Alice share a secret key, and they are the only ones in the world who know the key. If Alice receives a document that was encrypted with the key, and knows that she did not encrypt the document herself, then the document is known to be verifiable and non- forgeable (assuming a suitably strong encryption system was used). However, Alice can not convince someone else that Bob must have sent the document, since in fact Alice knew the key herself and could have encrypted/sent the document.