mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-07-30 18:08:39 -04:00
grammar
This commit is contained in:
parent
68b3c1ce04
commit
7999a10061
1 changed files with 1 additions and 1 deletions
|
@ -19,7 +19,7 @@ We know how to secure data in storage using E2EE, but is it possible to ensure d
|
|||
|
||||
## History
|
||||
|
||||
In a pivotal [paper](https://dspace.mit.edu/bitstream/handle/1721.1/148953/MIT-LCS-TM-125.pdf?sequence=1) called "Mental Poker" by Adi Shamir, Ronald L. Rivest, and Leonard M. Adleman from 1979, the researchers attempt to demonstrate a way of playing poker over distance using only messages and still have it be a fair game.
|
||||
In a seminal [paper](https://dspace.mit.edu/bitstream/handle/1721.1/148953/MIT-LCS-TM-125.pdf?sequence=1) called "Mental Poker" by Adi Shamir, Ronald L. Rivest, and Leonard M. Adleman from 1979, the researchers attempt to demonstrate a way of playing poker over a distance using only messages and still have it be a fair game.
|
||||
|
||||
To explain, fan favorites Alice and Bob will make a return. First, Bob encrypts all the cards with his key, then sends them to Alice. Alice picks five to deal back to Bob as his hand, then encrypts five with her own key and sends those to Bob as well. Bob removes his encryption from all ten cards and sends Alice's cards back to her.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue