answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darina [25.2K]
2 years ago
6

Suppose Alice has a and Bob has b. Alice and Bob also share a secure communication channel. Chris wants to compute S = a ⊕ b. Al

ice does not want Chris or Bob to learn a and Bob does not want Chris or Alice to learn b. How can this be done?
Computers and Technology
1 answer:
finlep [7]2 years ago
6 0

Answer:

This can be done by sharing some number b/w Alice and Bob.

Let a number c is shared b/w Alice and Bob.

c should not be shared with Chris.

Now, Alice can share (a xor c) with Chris but not to Bob.

Similarly, Bob can share (b xor c) with Chris but not to Alice.

So, Now Chris know (a xor c) and (b xor c).

Chris can calculate (a xor b) = (a xor c) xor ( b xor c).....

So Chris can calculate (a xor b) with satisfying all constraints.

You might be interested in
The Windows ________ is a hierarchical database that stores system configuration information. It maintains files used to control
Diano4ka-milaya [45]

Answer:

Registry

Explanation:

Windows Registry is used to store the configuration and setting information for hardware and software program which is critical for Windows operation. The registries are structured in hierarchical database model.  

Basically, hierarchical database model is akin to a tree format which consist of the parent nodes and their child nodes.  For example, a node named as HKEY_LOCAL_MACHINE can possess child nodes HARDWARE, SOFTWARE AND SYSTEM.

The node in the tree is also termed as a key.

8 0
2 years ago
The Spinning Jenny reduced the number of workers necessary to _______. a.remove cotton seeds from fibers b.pump water from the m
bazaltina [42]

The answer is D: Turn yarn into cloth.

During the industrial revolution, a number of new inventions in the textile industry greatly impacted this industry. However, it was the invention of the Spinning Jenny that is credited a lot. It helped move the textile industry from homes to factories and made wool spinning easier and faster. This invention, however, impacted the labor workforce. It reduced the amount of work needed to produce yarn. One worker was able to work 8 or more spools at once and rose to 120 due to technological advancements.

5 0
2 years ago
What is wrong with line 1?
Gelneren [198K]

Answer:

The set is a object of the class 'H' and the setY method is a member of G class which is not called by the object of H class.

Explanation:

  • If a user calls the G function which is not a private by the help of H class objects then it can be called. It is because all the public and protected methods of A class can be accessed by the B class if B extends the A-class.
  • If any class is extended by the other class then the derived class holds the property of the base class and the public and protected method can be accessed by the help of a derived class object.
  • The derived class object can be created by the help of base class like written in the "line 1".
  • But the base class can not call the member of the derived class.
5 0
2 years ago
What does the hard disk drive do? It stores all of the information on a computer. It controls a computer’s operating system. It
umka21 [38]

The hard disk drive, OR HDD Stores all the information on the computer.

5 0
2 years ago
Read 2 more answers
A chess-playing computer program that routinely calculates all possible outcomes of all possible game moves best illustrates pro
Evgesh-ka [11]
<span>A chess-playing computer program that routinely calculates all possible outcomes of all possible game moves best illustrates problem solving by means of </span>brute force.
5 0
2 years ago
Other questions:
  • Represent decimal number 8620 in (a) BCD, (b) excess-3 code, (c)2421 code, and (d) as a binary number
    7·1 answer
  • Cathy connected a keyboard, mouse, and printer to her computer through a Bluetooth connection. What type of network has she crea
    10·2 answers
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • Which of the following is technically not a programming language?
    12·2 answers
  • Gwen recently purchased a new video card, and after she installed it, she realized she did not have the correct connections and
    6·1 answer
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
  • The new Director of Information Technology has asked you to recommend a strategy to upgrade the servers on their network. Recomm
    9·1 answer
  • A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
    10·2 answers
  • On the Direct Marketing worksheet, create appropriate range names for Design Fee (cell B8), Cost Per Ad (cell B9), Total Clicks
    15·1 answer
  • Even though Wordpress is basically free, what is the company trying to accomplish?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!