Preface | |
1 Cheating | 1 |
1.1 How Cheaters Prosper . . | 2 |
1.2 Stopping Cheaters | 4 |
1.3 Using the Book | 7 |
2 Encryption | 9 |
2.1 Encryption Tools | 10 |
2.2 Uses | 14 |
2.3 Encryption Basics | 15 |
2.3.1 Modulo Arithmetic | 15 |
2.3.2 Diffie-Hellman Key Exchange | 16 |
2.4 RSA | 17 |
2.5 Conclusion | 18 |
2.5.1 Lessons | 18 |
3 Synchronized | 21 |
3.1 Synchrony | 21 |
3.2 Basic Structure | 22 |
3.3 Trading Time for Secrecy | 23 |
3.3.1 Bluffing | 24 |
3.4 Conclusion | 24 |
3.4.1 Lessons | 24 |
4 Bit Commitment | 27 |
4.1 Commitment | 28 |
4.2 Practical Considerations | 28 |
4.2.1 Adding Structure | 29 |
4.2.2 Adding Randomness | 30 |
4.3 Using Encryption Functions | 30 |
4.4 Conclusion | 31 |
4.4.1 Lessons | 32 |
5 Randomness | 33 |
5.1 Remote Viewing | 34 |
5.2 Hashing A Random Number | 34 |
5.3 Preventing Eavesdroppers | 35 |
5.3.1 More than Two People | 36 |
5.4 Attacks | 36 |
5.5 Conclusion | 37 |
5.5.1 Lessons | 38 |
6 Lottery | 41 |
6.1 Lotto Tickets | 41 |
6.2 Printing Lottery Tickets | 42 |
6.3 Conclusion | 43 |
6.3.1 Lessons | 43 |
7 Cards | 45 |
7.1 Dealing a Hand | 45 |
7.2 Commutative Encryption | 46 |
7.2.1 Implementation Details | 47 |
7.2.2 Creating the Cards | 48 |
7.3 Extending the Algorithm for Many Players | 49 |
7.3.1 Shuffling | 49 |
7.3.2 Dealing the Cards | 50 |
7.4 Conclusion | 50 |
7.4.1 Lessons | 50 |
8 Veils | 53 |
8.1 Obscuring the Information | 54 |
8.2 Splitting the Information | 55 |
8.2.1 Encrypting the Information | 55 |
8.3 Hiding a Tree in a Forest | 56 |
8.4 Conclusion | 57 |
8.4.1 Lessons | 57 |
9 Signatures | 59 |
9.1 Digital Signatures for Data Structures | 60 |
9.1.1 Passcodes for MACs | 60 |
9.2 Hierarchies and Hash Trees | 61 |
9.3 Reducing the Output | 62 |
9.4 Conclusion | 62 |
9.4.1 Lessons | 63 |
10 Certificates | 65 |
10.1 Certificates of Authenticity | 65 |
10.2 Hierarchies of Signatures | 66 |
10.2.1 Trees versus Webs | 67 |
10.3 Key Schemes | 68 |
10.3.1 Key Expiration | 69 |
10.4 Conclusion | 69 |
10.4.1 Lessons | 70 |
11 Provenance | 71 |
11.1 Ownership | 71 |
11.2 A Basic Scheme | 72 |
11.3 Disputes and Cheating | 73 |
11.4 Conclusion | 74 |
11.4.1 Lessons | 75 |
12 Blind Signatures | 77 |
12.1 Blind Trust | 78 |
12.2 The Basic Algorithm | 78 |
12.3 Multiple Key Control | 79 |
12.4 Conclusion | 80 |
12.4.1 Lessons | 80 |
13 Cash | 83 |
13.1 Serial Numbers and Signatures | 84 |
13.2 Transactions | 85 |
13.2.1 Peer-to-Peer | 85 |
13.2.2 Making Change | 86 |
13.3 Removing the Central Bank | 87 |
13.3.1 Multiple Audits | 87 |
13.4 Conclusion | 88 |
13.4.1 Lessons | 88 |
14 Expendable | 91 |
14.1 Once and Again | 91 |
14.2 One-Time Nonces | 92 |
14.2.1 Public Key Tricks | 93 |
14.3 Access Chains | 93 |
14.4 Date-stamped Access | 94 |
14.5 Conclusion | 95 |
14.5.1 Lessons | 95 |
15 Oblivious Transfer | 97 |
15.1 Pick a Card | 97 |
15.2 The Algorithm | 98 |
15.2.1 Just Two At Once | 98 |
15.2.2 Handling More than Two Choices | 99 |
15.3 Conclusion | 100 |
15.3.1 Lessons | 101 |
- Log in to post comments