1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
14

Alice has an item x and Bob has a set of five distinct items y1, y2, y3, y4 and y5. Design a protocol through which Alice (but n

ot Bob) finds out whether her x equals any of Bob's five items; Alice should not find out anything other than the answer ("Yes" or "No") to the above question, and Bob should not know that answer or any secret from Alice. Do not use a hash-based solution because even though the probability of a colission is small, Alice requires that no such colission can occur (but using encryption is fine, because in that case two distinct items that are encrypted with the same key will result in two different ciphertexts).
NOTE: THE SOLUTION FOR THIS SHOULD BE MATHEMATICALLY EXACT.
Computers and Technology
1 answer:
Westkost [7]3 years ago
4 0

The protocol shows that the items of Alice = {x} and the items of Bob = {y1, y2, y3, y4, y5}

<h3>How to depict the protocol</h3>

The ways to design the protocol will be:

  • Alice will get Bob's public key.
  • Alice will send a communication to Bob encrypted through Bob's community key.
  • Bob's motivation has a clandestine key.
  • Through the top-secret key, Bob will try to work out the communication.
  • Bob will give a response called yes or no.
  • Bob doesn't know what substances are with Alice.
  • If Alice Alice gets any of the responses as yes then Alice's item is equivalent to any of Bob's five items.
  • If Alice's items are not equal to Bob's items then Alice will get a response as no.

It should be noted that protocol is important for relaying datagrams across the network boundaries.

Learn more about protocol on:

brainly.com/question/17062016

You might be interested in
It’s illegal to hack into a system without authorization, but is it ethical for a gray-hat to hack into a system if the intent i
oksian1 [2.3K]

Answer:

Some hackers are smart about there hacking .. others have a a plot but didnt test there theory

Explanation:

8 0
3 years ago
Which is an example of emoticon use?
Elina [12.6K]
I think it’d be answer B
(I do psychology and it’s kind of similar to this)
8 0
3 years ago
Write and test a Python program to find and print the largest number in a set of real (floating point) numbers. The program shou
fenix001 [56]

I can't read oooooyeaaaa

3 0
4 years ago
What is the outlined area called?
LenKa [72]

Answer:

If you're talking about perimeter (the length of the outer edges)

Explanation:

6 0
4 years ago
________ is a process in which computer software that uses statistical analysis, database technology, and artificial intelligenc
QveST [7]

Answer:

Data Mining.

Explanation:

Data Mining is the process in which a computer software uses database technology,artificial intelligence and statistical analysis so that it can find the hidden patterns,connections and trends in the data.To help business owners to make better marketing decisions and predictions about the customer's behavior.

6 0
4 years ago
Other questions:
  • Blood alcohol level is the ratio between the alcohol consumed and the blood in the body
    10·1 answer
  • One day a subcontractor calls him saying that he needs a replacement check for the job he completed at 1437 Elm Street. Jonathan
    14·1 answer
  • Which person would be the best fit for a career in the information technology field?
    14·1 answer
  • Which image format is good for compressing large, complex images like photos into smaller file sizes?
    5·1 answer
  • What is the system of phonographic disc recordings paired with a projector called?
    9·1 answer
  • Which of the following is a difference between a centralized communication network and a decentralized communication network? a.
    15·1 answer
  • What is networking and types of networking?​
    6·1 answer
  • List six common raster image file types.
    9·1 answer
  • If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde
    11·1 answer
  • Today
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!