<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Geometric_cryptography</id>
	<title>Geometric cryptography - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Geometric_cryptography"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Geometric_cryptography&amp;action=history"/>
	<updated>2026-05-15T09:08:59Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=Geometric_cryptography&amp;diff=2420&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;'''Geometric cryptography''' is an area of cryptology where messages and ciphertexts are represented by geometric quantities such as angles or intervals and wh...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Geometric_cryptography&amp;diff=2420&amp;oldid=prev"/>
		<updated>2019-03-21T04:11:58Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Geometric cryptography&amp;#039;&amp;#039;&amp;#039; is an area of &lt;a href=&quot;/index.php?title=Cryptology&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Cryptology (page does not exist)&quot;&gt;cryptology&lt;/a&gt; where &lt;a href=&quot;/index.php?title=Message&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Message (page does not exist)&quot;&gt;messages&lt;/a&gt; and &lt;a href=&quot;/index.php?title=Ciphertext&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Ciphertext (page does not exist)&quot;&gt;ciphertexts&lt;/a&gt; are represented by geometric quantities such as &lt;a href=&quot;/index.php?title=Angle&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Angle (page does not exist)&quot;&gt;angles&lt;/a&gt; or intervals and wh...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''Geometric cryptography''' is an area of [[cryptology]] where [[message]]s and [[ciphertext]]s are represented by geometric quantities such as [[angle]]s or intervals and where [[computation]]s are performed by [[ruler and compass construction]]s. The difficulty or impossibility of solving certain geometric problems like trisection of an angle using ruler and compass only is the basis for the various protocols in geometric cryptography. This field of study was suggested by Mike Burmester, [[Ronald L. Rivest]] and [[Adi Shamir]] in 1996.&amp;amp;lt;ref name=Shamir/&amp;amp;gt; Though the cryptographic methods based on geometry have practically no real life applications, they are of use as pedagogic tools for the elucidation of other more complex cryptographic protocols.&amp;amp;lt;ref name=Shamir/&amp;amp;gt; &lt;br /&gt;
==A geometric one-way function==&lt;br /&gt;
Some of the geometric cryptographic methods are based on the [[Angle trisection#Proof_of_impossibility|impossibility of trisecting an angle]] using ruler and compass. Given an arbitrary angle, there is a straightforward ruler and compass construction for finding the triple of the given angle. But there is no ruler and compass construction for finding the angle which is exact one-third of a given angle. Hence the function which assigns the triple of an angle to a given angle can be thought of as a [[one-way function]], the only constructions allowed being ruler and compass constructions.&lt;br /&gt;
&lt;br /&gt;
==A geometric identification protocol==&lt;br /&gt;
A geometric identification protocol has been suggested based on the one-way function indicated above. &lt;br /&gt;
&lt;br /&gt;
Assume that Alice wishes to establish a means of proving her identity later to Bob.&lt;br /&gt;
&lt;br /&gt;
'''Initialization''': Alice publishes a copy of an angle Y&amp;amp;lt;sub&amp;amp;gt;A&amp;amp;lt;/sub&amp;amp;gt; which is constructed by Alice as the triple of an angle X&amp;amp;lt;sub&amp;amp;gt;A&amp;amp;lt;/sub&amp;amp;gt; she has constructed at random. Because trisecting an angle is impossible Alice is confident that she is the only one who knows X&amp;amp;lt;sub&amp;amp;gt;A&amp;amp;lt;/sub&amp;amp;gt;.&lt;br /&gt;
&lt;br /&gt;
'''Identification Protocol''': Alice gives Bob a copy of an angle R which she has constructed as the triple of an angle K that she has selected at random.&lt;br /&gt;
&lt;br /&gt;
#Bob flips a coin and tells Alice the result.&lt;br /&gt;
#If Bob says &amp;quot;heads&amp;quot; Alice gives Bob a copy of the angle K and Bob checks that 3*K = R.&lt;br /&gt;
#If Bob says &amp;quot;tails&amp;quot; Alice gives Bob a copy of the angle L = K + X&amp;amp;lt;sub&amp;amp;gt;A&amp;amp;lt;/sub&amp;amp;gt; and Bob checks that 3*L = R + Y&amp;amp;lt;sub&amp;amp;gt;A&amp;amp;lt;/sub&amp;amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The three steps are repeated ''t'' times independently. Bob accepts Alice's proof of identity only if all ''t'' checks are successful.&lt;br /&gt;
&lt;br /&gt;
This protocol is an interactive proof of knowledge of the angle X&amp;amp;lt;sub&amp;amp;gt;A&amp;amp;lt;/sub&amp;amp;gt; (the identity of Alice) with&lt;br /&gt;
error 2&amp;amp;lt;sup&amp;amp;gt;−''t''&amp;amp;lt;/sup&amp;amp;gt;. The protocol is also [[Zero-knowledge proof|zero-knowledge]].&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
[[Category:Cryptography]]&lt;br /&gt;
[[Category:Cryptographic algorithms]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>