next_inactive up previous
Up: MA479 / CSSE479 Schedule Page

Trap-Door Cryptosystems

What is a trap-door cryptosystem?

Computational Requirements

  1. ``Easy'' to find r in $ \mathcal {R}$ and compute u = f (r) given r

  2. ``Easy'' to compute C = Eu(P) given P and u

  3. ``Easy'' to compute P = Dr(C) given C and r

  4. ``Hard'' to compute r = f-1(u) given only u

  5. ``Hard'' to compute P = Df-1(u)(C) given only u and C

About this document ...

Trap-Door Cryptosystems

This document was generated using the LaTeX2HTML translator Version 2K.1beta (1.57)

Copyright © 1993, 1994, 1995, 1996, Nikos Drakos, Computer Based Learning Unit, University of Leeds.
Copyright © 1997, 1998, 1999, Ross Moore, Mathematics Department, Macquarie University, Sydney.

The command line arguments were:
latex2html -link 0 -split +0 -html_version 3.2,math trap-door.tex

The translation was initiated by Joshua R Holden on 2004-04-25


next_inactive up previous
Up: MA479 / CSSE479 Schedule Page
Prof. Joshua Holden
Rose-Hulman Institute of Technology
Math 479 / CSSE 479, Spring 2003--2004
2004-04-25