An anonymous submission system that does not require a trusted third party
A trusted, key exchange technology, applied in transmission systems, electrical components, etc., can solve problems that do not rely on the participation of trusted third parties
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0018] A specific embodiment of the present invention implemented by Perl programming is deployed in a small network of a server and several clients, and exists in each client and server in the form of a background process. The process is mainly divided into two parts, the initialization process and the working process. The initialization is used to wake up the process to execute and negotiate the execution parameters. After the initialization, the work process starts to execute periodically in the background. In terms of overall communication support, using Perl's powerful library AnyEvent for event-driven programming has very excellent performance, making the present invention reliable and easy to maintain.
[0019] (1), client initialization:
[0020] a. Several clients initiate TCP connections to the server respectively, by using the IO::Socket module;
[0021] b. The Diffie-Hellman key exchange is performed between the clients, and the obtained secret number is used as ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More