1

There is DH key exchange, but it requires an exchange before participants get to the shared secret. If Bob has only published a verifying key VB, is there a scheme where the following can be achieved?

  1. Alice, from Bob's verification key VB and some nonce N, derives an ephemeral encryption key EB for Bob
  2. Bob, from EB, N and SB, reduces the decryption key DB
  3. Without knowledge of SB, Alice can not reduce DB from what they have

0 Answers0