First page Back Continue Last page Overview Graphics
A general approach for solution:
Formalize the required functionality in terms of a “centralized trusted service”.
Run a cryptographic protocol that realizes the “centralized trusted service” functionality.
- Can use a generic construction (typically inefficient)
- Can design more efficient protocols for a given trusted-service.
Notes: