Key Establishment. For each 1 ≤ i, j ≤ k, ▇▇▇▇▇ computes zi,j = j(EBj/⟨Uj + [αi]Vj⟩), and then she calculates the hash h = H(z1,1, . . . , z1,k, z2,1, . . . , z2,k, . . . , ▇▇,▇, . . . , ▇▇,▇). Similarly, for each 1 ≤ i, j ≤ k, ▇▇▇ computes zi′,j = j(EAi/⟨Ri + [βj]Si⟩), and calculates the hash h′ = H(z1′ ,1, . . . , z1′ ,k, z2′ ,1, . . . , z2′ ,k, . . . , zk′ ,1, . . . , zk′ ,k).
Appears in 1 contract
Sources: Key Agreement Protocol
Key Establishment. For each 1 ≤ i, j ≤ k, ▇▇▇▇▇ computes zi,j = j(EBj/⟨Uj + [αi]Vj⟩), and then she calculates the hash h = H(z1,1, . . . , z1,k, z2,1, . . . , z2,k, . . . , ▇▇,▇, . . . , ▇▇,▇). Similarly, for each 1 ≤ i, j ≤ k, ▇▇▇ Bob computes zi′,j = j(EAi/⟨Ri + [βj]Si⟩), and calculates the hash h′ = H(z1′ ,1, . . . , z1′ ,k, z2′ ,1, . . . , z2′ ,k, . . . , zk′ ,1, . . . , zk′ ,k).
Appears in 1 contract
Sources: Key Agreement Protocol