The scenario Sample Clauses

The scenario. We again have the entities ▇▇▇▇▇ and ▇▇▇, but now, we don’t care about the secrecy of the content of the message, but we want to verify that the message that ▇▇▇▇▇ sent to Bob was really written by ▇▇▇▇▇ and not by a malicious entity.
The scenario. In the next lines, we introduce the standard key-agreement scenario considered throughout this work. The two honest parties and the eavesdropper receive correlated symbols, denoted by the random variables X, Y and Z, respectively, distributed according to the probability distribution PXYZ. The goal of the honest parties is to map these symbols into a secret key, which will later be used for secure information transmission via one-time pad. In order to do that, ▇▇▇▇▇ and ▇▇▇ exchange information over an authenticated but insecure communication channel. The channel is authenticated but insecure because Eve can receive the whole com- munication, but cannot tamper it. A more general scenario is given by a completely insecure channel where Eve can also modify and introduce messages. However, here we will not consider this possibility as there are easy mechanisms to check the integrity of the messages.