作者: Wesley Leggette , Jason K. Resch
DOI:
关键词: Encryption 、 Theoretical computer science 、 Shared secret 、 Key (cryptography) 、 Public-key cryptography 、 Ephemeral key 、 Key generation 、 Prime (order theory) 、 Modulo 、 Computer network 、 Mathematics
摘要: A method begins by a dispersed storage (DS) processing module generating shared secret key from public of another entity and private using first modulo prime polynomial function, wherein is generated the second function other derived on entity. The continues with DS encrypting message to produce an encrypted message. outputting