What solves symmetric key distribution problem?
Public/private keys
How to prevent Eve from creating a pair of keys pretending to be Bob?
Public key infrastructure
1. Web of trust
2. Trusted authority
What’s the hiding property?
During commit phase, receiver knows nothing about x
What’s the binding property?
Sender can’t change x after committing to it.
The binding property protects the sender.
False, protects the receiver
What can prevent a replay attack?
Nonce