1 Asymmetric trusted party protocol for non?repudiation (35 points) Part of material considered in class is a symmetric exchange protocol between Alice and Bob involving a trusted party (Carol) and achieving non-repudiation. We considered only a symmetric key protocol. Formulate such a protocol for the case of asymmetric keys where the parties use their public and private keys. Your solution should include. • Description of a protocol in terms of sequence of operations performed by the parties (Alice does this, Bob does that, Carol does that, etc.) • Justification as to why you believe such a protocol makes it hard for Alice to disown her message. Remark. There can be more than one possible solution. I will accept any provided that it is well justified. 2 Symmetric exchange keys between banks and PCOs The purpose of this exercise is to demonstrate the impraticality of any two banks sharing their secret keys. Suppose that there are 10000 = 104 banks and 10 payment card organizations (PCOs). 1. (15 points) How many secret keys will be needed if each PCO shares a unique secret key with each bank? 2. (15 points) How many extra secret keys will be needed if every two banks share a unique secret key? 3 Zero knowledge proofs (35 points) Suppose Alice has in her computer a file with her address. Alice does not show Bob the content of the file because she does not want him to know her exact address. However, she wants to convince Bob that she lives in London. How can she do that? Remark. Please explain in detail the corresponding protocol and why you believe it works the intended way.

- QSO 321 Module Two Journal Guidelines and Rubric
- In this assignment, you will explore important considerations for culturally competent business practices, which can help strengthen and maintain relation
- You are to read the section identified and conduct your own external research before crafting your submission. In the discussion, you are to answer the
- Read Josie King’s story: https://www.healthleadersmedia.com/clinical-care/josies-story-teaches-hospitals-how-become-safer Read the following safety techni
- Change in an Organization This chapter involves change and the response to change in an organization. If you feel uncomfortable already you probably are i
- Is your clinical change project highly significant to nursing? Does the project encompass the core graduate nursing competencies of patient-centered care,
- For this assignment you are going to identify a complex healthcare ethical dilemma facing the professional nurse in our multi-dimensional healthcare envir
- When I compared the techniques, the main difference between t-tests and ANOVAs is the number of means being compared. T-tests are limited to two means, wh
- According to Moore et al. (2021) the role of statistical tests are to analyze relevant statistical data to test hypothesis, observe patterns and to obtain
- Should the United States reconsider its approach to combining scholastic education with athletics? Should students who are not progressing acceptably in a