1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
14

Alice has an item x and Bob has a set of five distinct items y1, y2, y3, y4 and y5. Design a protocol through which Alice (but n

ot Bob) finds out whether her x equals any of Bob's five items; Alice should not find out anything other than the answer ("Yes" or "No") to the above question, and Bob should not know that answer or any secret from Alice. Do not use a hash-based solution because even though the probability of a colission is small, Alice requires that no such colission can occur (but using encryption is fine, because in that case two distinct items that are encrypted with the same key will result in two different ciphertexts).
NOTE: THE SOLUTION FOR THIS SHOULD BE MATHEMATICALLY EXACT.
Computers and Technology
1 answer:
Westkost [7]3 years ago
4 0

The protocol shows that the items of Alice = {x} and the items of Bob = {y1, y2, y3, y4, y5}

<h3>How to depict the protocol</h3>

The ways to design the protocol will be:

  • Alice will get Bob's public key.
  • Alice will send a communication to Bob encrypted through Bob's community key.
  • Bob's motivation has a clandestine key.
  • Through the top-secret key, Bob will try to work out the communication.
  • Bob will give a response called yes or no.
  • Bob doesn't know what substances are with Alice.
  • If Alice Alice gets any of the responses as yes then Alice's item is equivalent to any of Bob's five items.
  • If Alice's items are not equal to Bob's items then Alice will get a response as no.

It should be noted that protocol is important for relaying datagrams across the network boundaries.

Learn more about protocol on:

brainly.com/question/17062016

You might be interested in
CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi
Nastasia [14]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and good performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
An employee at your graphic design firm needs a solid computer that can handle the variety of graphics and animations he works w
olganol [36]

Answer:

I would say the gaming media because the computer runs better.

Explanation:

Please mark brainlest I beg of you.

3 0
3 years ago
Read 2 more answers
Data is communicated through various input devices true or false​
kipiarov [429]
I would believe this is true if the following are also true.

Input devices are things like keyboards, mouses, buttons, e.c.t.

If that is true then I would believe it to be true due to multiple inputs are being used to communicate.
3 0
3 years ago
Give the value of the zero flag, the carry flag, the signflag, and the overflow flag after each of the following instructions if
Vanyuwa [196]
The correct answer is A for this question
6 0
2 years ago
As an IT specialist you are asked to troubleshoot a problem with two
Kamila [148]

Answer:

B

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Will give brainliest and good amount of points, no false answers.
    5·1 answer
  • You're trying to decide which disk technology to use on your new server. the server will be in heavy use around the clock every
    10·1 answer
  • When jump starting a vehicle , once the stalled vehicle is successfully started remove the cable in same order in which they wer
    13·1 answer
  • Why do the holes at the top of parachutes make it go slower
    12·1 answer
  • Write a program of while loop 1234 get printed 4231
    7·1 answer
  • A ____ is used to perform a forward-only (sequential) access of the data in the data source while a ____ is used to populate a d
    11·1 answer
  • Columns, margins and orientation can all be found on what tab?
    15·1 answer
  • Which statement is true with respect to Java?
    12·1 answer
  • Elena wrote the following code in Scratch to have the sprite move and then turn around. However, the code does not work as expec
    5·1 answer
  • What is the best description of an unbound control?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!