摘要 |
A method of validating an encrypted message comprises: (a) representing the message as a message polynomial; (b) encrypting the message polynomial to form a cipher polynomial; (c) hashing first and second hash function inputs representative of the message polynomial and the cipher polynomial to create one or more hash outputs; and (d) transmitting to a recipient both an encrypted message defined by the cipher polynomial and the said one or more hash outputs. The method is particularly applicable to public key cryptosystems. |