摘要 |
<p>A method of validating an encrypted message comprises; (a) representing the message (P) as a message polynomial (mi); (b) encrypting the message polynomial (mi) to form a cipher polynomial (ei); (c) hashing first and second hash function inputs representative of the message polynomial and the cipher polynomial to create one or more hash outputs (Bi); and (d) transmitting to a recipient both an encrypted message defined by the cipher polynomial and the said one or more hash outputs. The method is particularly applicable to public key cryptosystems.</p> |