Question: Suppose you changed the protocol in 2 0 . 8 . 2 Plausible Deniability Based on Public Key Technology so that Alice first signs S

Suppose you changed the protocol in 20.8.2 Plausible Deniability Based on Public
Key Technology so that Alice first signs S, and then encrypts with Bob's public key. So
instead of sending [{S}Bob]Alice to Bob, she sends {[S]Alice}Bob. Does this work? (i.e., can
Bob be sure that the message came from Alice, but not be able to prove it to a third party)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!