Cryptography - Science or Magic?

author: James L. Massey, ETH Zurich
published: July 26, 2010,   recorded: October 2001,   views: 7598
Categories

Related content

Report a problem or upload files

If you have found a problem with this lecture or would like to send us extra material, articles, exercises, etc., please use our ticket system to describe your request and upload the data.
Enter your e-mail into the 'Cc' field, and we will keep you updated with your request's status.
Lecture popularity: You need to login to cast your vote.
  Delicious Bibliography

Description

Examples of the "tricks" that can be performed with modern cryptographic techniques will be presented and each trick explored to see whether it is "science" (i.e., it can be proved to do what it seems to do) or "magic" (i.e., what it seems to do is, or may be, only an illusion). The tricks considered will include no-break cryptography, no-leak secret sharing, no-key cryptography, no-see signatures, no-watch coin tossing, and no-knowledge proofs.

Link this page

Would you like to put a link to this lecture on your homepage?
Go ahead! Copy the HTML snippet !

Reviews and comments:

Comment1 Ramin Sadr, May 22, 2011 at 6:27 a.m.:

James Massey is not only a great scientist and a pioneer, but a great human being and the best teacher I ever had. I miss you Professor Massey. His impact on my life was ever lasting and my inspiration.


Comment2 Rob Evans, September 25, 2012 at 12:29 p.m.:

There is an easyer way. first, Bob gives alice his lock. alice then puts her message and her lock (open) in the box and locks the box with Bobs lock. Bob can send the box back with his message and lock (open) in the box, with it locked by alices lock. Box only comutes once for transfer of message.

Write your own review or comment:

make sure you have javascript enabled or clear this field: