SlideShare una empresa de Scribd logo
1 de 11
SECRET DISCLOSURE
ALL-OR-NOTHING
DISCLOSURE SCHEME
IDEA
Bob
Carol Alice
.
.
.
S1
SN
Sb
Sc
FBI
The fixed bit index of x and y are the bits
where the ith bit of x equals the ith bit of y.
x = 110101001011
y = 101010000110
FBI(x, y) = {1, 4, 5, 11}
(1)
Alice generates a public-key/private-key key pair and
tells Bob (but not Carol) the public key. She generates
another public-key/private-key key pair and tells Carol
(but not Bob) the public key.
Alice
Bob Carol
B C
(2)
Bob generates k n-bit random numbers, B1 , B2 , ..., Bk,
and tells them to Carol. Carol generates k n-bit random
numbers, C1 , C2 , ..., Ck, and tells them to Bob.
Bob Carol
B1 , B2 , ..., Bk
C1 , C2 , ..., Ck
(3)
Bob encrypts Cb (remember, Sb is the secret he wants
to buy) with the public key from Alice. He computes the
FBI of Cb and the result he just encrypted. He sends this
FBI to Carol.
Bob Carol
FBI(Cb, E(Cb)) =
FBI(Bc, E(Bc)) =
b
c
B
C
(4)
Alice
Bob Carol
CB
b
C
B
…, compl(FBIc,Bi), … …, compl(FBIb,Ci), …
Bob takes each of the n-bit numbers B1, B2 , ..., Bk, and
replaces every bit whose index is not in the FBI he
received from Carol with its complement. He sends this
new list of n-bit numbers, B'1, B'2, ..., B'k, to Alice
(5)
Alice decrypts all C'i with Bob’s private key, giving her k
n-bit numbers: C"1, C"2, ..., C"k. She computes
Si ⊕ C"i, for i = 1 to k, and sends the results to Bob
Alice
Bob Carol
CB
b
C
B
…, Si ⊕ D(C’i), … …, Si ⊕ D(B’i), …
(5)
Alice decrypts all C'i with Bob’s private key, giving her k
n-bit numbers: C"1, C"2, ..., C"k. She computes
Si ⊕ C"i, for i = 1 to k, and sends the results to Bob
Alice
Bob Carol
CB
b
C
B
…, Si ⊕ D(compl(FBIb,Ci)), … …, Si ⊕ D(compl(FBIc,Bi)), …
(6)
Bob computes Sb by XORing Cb and the bth number
he received from Alice.
Bob Carol
B
b
C
Sb
C’’i ⊕ Ci B’’i ⊕ Bi
Sc
Alice
REFERENCES
1. All-or-Nothing Disclosure of Secrets. Bruce Schneier.
Applied Cryptography, Second Edition: Protocols,
Algorithms, and Source Code in C. Wiley Computer
Publishing, John Wiley & Sons, Inc.
2. Python implementation:
https://gitlab.com/yalegko/secret-disclosure

Más contenido relacionado

Más de yalegko (7)

SD-WAN Internet Census
SD-WAN Internet CensusSD-WAN Internet Census
SD-WAN Internet Census
 
So Your WAF Needs a Parser
So Your WAF Needs a ParserSo Your WAF Needs a Parser
So Your WAF Needs a Parser
 
WebGoat.SDWAN.Net in Depth
WebGoat.SDWAN.Net in DepthWebGoat.SDWAN.Net in Depth
WebGoat.SDWAN.Net in Depth
 
[ISC] Docker + Swarm
[ISC] Docker + Swarm[ISC] Docker + Swarm
[ISC] Docker + Swarm
 
White box cryptography
White box cryptographyWhite box cryptography
White box cryptography
 
Covert timing channels using HTTP cache headers
Covert timing channels using HTTP cache headersCovert timing channels using HTTP cache headers
Covert timing channels using HTTP cache headers
 
Covert timing channels using HTTP cache headers
Covert timing channels using HTTP cache headersCovert timing channels using HTTP cache headers
Covert timing channels using HTTP cache headers
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

All-Or-Nothing Secret Disclosure

  • 3. FBI The fixed bit index of x and y are the bits where the ith bit of x equals the ith bit of y. x = 110101001011 y = 101010000110 FBI(x, y) = {1, 4, 5, 11}
  • 4. (1) Alice generates a public-key/private-key key pair and tells Bob (but not Carol) the public key. She generates another public-key/private-key key pair and tells Carol (but not Bob) the public key. Alice Bob Carol B C
  • 5. (2) Bob generates k n-bit random numbers, B1 , B2 , ..., Bk, and tells them to Carol. Carol generates k n-bit random numbers, C1 , C2 , ..., Ck, and tells them to Bob. Bob Carol B1 , B2 , ..., Bk C1 , C2 , ..., Ck
  • 6. (3) Bob encrypts Cb (remember, Sb is the secret he wants to buy) with the public key from Alice. He computes the FBI of Cb and the result he just encrypted. He sends this FBI to Carol. Bob Carol FBI(Cb, E(Cb)) = FBI(Bc, E(Bc)) = b c B C
  • 7. (4) Alice Bob Carol CB b C B …, compl(FBIc,Bi), … …, compl(FBIb,Ci), … Bob takes each of the n-bit numbers B1, B2 , ..., Bk, and replaces every bit whose index is not in the FBI he received from Carol with its complement. He sends this new list of n-bit numbers, B'1, B'2, ..., B'k, to Alice
  • 8. (5) Alice decrypts all C'i with Bob’s private key, giving her k n-bit numbers: C"1, C"2, ..., C"k. She computes Si ⊕ C"i, for i = 1 to k, and sends the results to Bob Alice Bob Carol CB b C B …, Si ⊕ D(C’i), … …, Si ⊕ D(B’i), …
  • 9. (5) Alice decrypts all C'i with Bob’s private key, giving her k n-bit numbers: C"1, C"2, ..., C"k. She computes Si ⊕ C"i, for i = 1 to k, and sends the results to Bob Alice Bob Carol CB b C B …, Si ⊕ D(compl(FBIb,Ci)), … …, Si ⊕ D(compl(FBIc,Bi)), …
  • 10. (6) Bob computes Sb by XORing Cb and the bth number he received from Alice. Bob Carol B b C Sb C’’i ⊕ Ci B’’i ⊕ Bi Sc Alice
  • 11. REFERENCES 1. All-or-Nothing Disclosure of Secrets. Bruce Schneier. Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C. Wiley Computer Publishing, John Wiley & Sons, Inc. 2. Python implementation: https://gitlab.com/yalegko/secret-disclosure