Information-theoretically secure equality-testing protocol with dispute resolution
Information-theoretically secure equality-testing protocol with dispute resolution
There are often situations where two remote users each have data, and wish to (i) verify the equality of their data, and (ii) whenever a discrepancy is found afterwards, determine which of the two modified his data. The most common example is where they want to authenticate messages they exchange. …