scispace - formally typeset
Search or ask a question

Showing papers on "Secure multi-party computation published in 1977"


Patent
06 Sep 1977
TL;DR: In this paper, a cryptographic system transmits a computationally secure cryptogram over an insecure communication channel without prearrangement of a cipher key, where the cipher key is generated by the conversers from transformations of exchanged transformed signals.
Abstract: A cryptographic system transmits a computationally secure cryptogram over an insecure communication channel without prearrangement of a cipher key. A secure cipher key is generated by the conversers from transformations of exchanged transformed signals. The conversers each possess a secret signal and exchange an initial transformation of the secret signal with the other converser. The received transformation of the other converser's secret signal is again transformed with the receiving converser's secret signal to generate a secure cipher key. The transformations use non-secret operations that are easily performed but extremely difficult to invert. It is infeasible for an eavesdropper to invert the initial transformation to obtain either conversers' secret signal, or duplicate the latter transformation to obtain the secure cipher key.

755 citations