Common use of Key Establishment Clause in Contracts

Key Establishment. For each 1 ≤ i, j ≤ k, ▇▇▇▇▇ computes zi,j = j(EBj/⟨Uj + [αi]Vj⟩), and then she calculates the hash h = H(z1,1, . . . , z1,k, z2,1, . . . , z2,k, . . . , ▇▇,▇, . . . , ▇▇,▇). Similarly, for each 1 ≤ i, j ≤ k, ▇▇▇ computes zi′,j = j(EAi/⟨Ri + [βj]Si⟩), and calculates the hash h′ = H(z1′ ,1, . . . , z1′ ,k, z2′ ,1, . . . , z2′ ,k, . . . , zk′ ,1, . . . , zk′ ,k).

Appears in 1 contract

Sources: Key Agreement Protocol

Key Establishment. For each 1 ≤ i, j ≤ k, ▇▇▇▇▇ computes zi,j = j(EBj/⟨Uj + [αi]Vj⟩), and then she calculates the hash h = H(z1,1, . . . , z1,k, z2,1, . . . , z2,k, . . . , ▇▇,▇, . . . , ▇▇,▇). Similarly, for each 1 ≤ i, j ≤ k, ▇▇▇ Bob computes zi′,j = j(EAi/⟨Ri + [βj]Si⟩), and calculates the hash h′ = H(z1′ ,1, . . . , z1′ ,k, z2′ ,1, . . . , z2′ ,k, . . . , zk′ ,1, . . . , zk′ ,k).

Appears in 1 contract

Sources: Key Agreement Protocol