Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

On the method of puzzles for key distribution

  • Published:
International Journal of Computer & Information Sciences Aims and scope Submit manuscript

Abstract

Merkle(1) has shown how keys can be exchanged over a public channel by the use of puzzles. His method gives a work advantage ofO(N 2)/O(N). He also posed the problem of finding other methods of using puzzles that give better work advantage. This paper provides a solution to Merkle's problem. A new method of key exchange, called the nested puzzles method, is also introduced.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. R. C. Merkle, Secure communications over insecure channels,Comm. of the ACM 21:294–299 (April 1978).

    Google Scholar 

  2. W. Diffie and M. E. Hellman, New directions in cryptography,IEEE Trans on Information Theory IT-22:644–659 (November 1976).

    Google Scholar 

  3. A. Shamir, R. L. Rivest, and L. M. Adleman, Mental poker, MIT Lab. of Computer Science Report TM-125, pp. 1–7 (November 1978).

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kak, S.C. On the method of puzzles for key distribution. International Journal of Computer and Information Sciences 13, 103–109 (1984). https://doi.org/10.1007/BF00978711

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF00978711

Key words