Question: Suppose you changed the protocol in 2 0 . 8 . 2 Plausible Deniability Based on Public Key Technology so that Alice first signs S
Suppose you changed the protocol in Plausible Deniability Based on Public
Key Technology so that Alice first signs S and then encrypts with Bob's public key. So
instead of sending SBobAlice to Bob, she sends SAliceBob Does this work? ie can
Bob be sure that the message came from Alice, but not be able to prove it to a third party
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
