主权项 |
1. In a communication system that includes a sender computer and at least one designated receiver computer coupled to the sender through a communication link, each one of the at least one designated receiver computer is equipped with computational resources stronger than computational resources of an adversary computer, the stronger computational resources including at least one of processor memory and communication, a method for encrypting a secret and sending the encrypted secret from the sender computer to the at least one designated receiver computer, the secret including a plurality of secret portions, the method comprising:
a) the sender computer defining at least one computational task having respective solutions; the at least one computational task is so defined such that the duration of solving said at least one computational task by each one of said at least one designated receiver computer is configured to be shorter than what would have been required for the adversary computer to solve the at least one computational task; for each secret portion of the secret, consecutively, b) the sender computer:
(i) encrypting said secret portion by using at least one solution of a task from among said at least one computational task; and(ii) sending through the communication link publicly said at task and said encrypted secret portion, wherein said publicly sent task except for a first publicly sent task is encrypted by using at least one solution of at least one previously publicly sent task; c) each one of the at least one designated receiver computer receiving said publicly sent task and decrypting said encrypted secret portion faster than what would have been required for the adversary computer to decrypt the encrypted secret portion, wherein said faster decrypting includes solving the publicly sent task faster than what would have been required for the adversary computer to solve the publicly sent task only due to said stronger computational resources, repeating said b) and c) until all encrypted secret portions are sent by the sender computer and decrypted by the at least one designated receiver computer, constituting the secret. |