Keys Terms (供条) => secret key info
Key (Establishment, Distribution, Management, Agreement, Exchange)
Patent Specification (五雷折:午字·年字)
Keys Terms (供条) => secret key info
Key (Establishment, Distribution, Management, Agreement, Exchange)
Patent Specification (五雷折:午字·年字)
Created on 07Apr2021 the WoodDay (辛丑年二月廿六日·昨天玄天上帝诞)
Updated on 14Apr2021 the WoodDay (辛丑年三月初三日·北帝诞·女儿节)
Keys Terms (供条) => secret key info
Key (Establishment, Distribution, Management, Agreement, Exchange)
Patent Specification (五雷折:午字·年字)
=> 阴田阳土(n = 5 +1)
=> like#1 = ln(32!)/e = 30.00
=> like#2 = ln(64!)/e = 75.47
【中文种子句:甸t | 字集二 (页10、51字)】 {
繁筆:據聞嘛,九某永德哥執展軟附、絕盡、剛傷、越殺、怕跑、消忘,概待竟排列座甚千落根客商,雙唱技切稱證照供條包育紅園夜集產值。
简体:据闻嘛,九某永德哥执展软附、绝尽、刚伤、越杀、怕跑、消忘,概待竟排列座甚千落根客商,双唱技切称证照供条包育红园夜集产值。
}
【中文种子句:甸ae·神人無功 | 字集三 (页15、95字)】 {
繁筆:泰孫:棋譜佩鎖,尺擬盛冬,映瞭震京。
简体:泰孙:棋谱佩锁,尺拟盛冬,映瞭震京。
}
Public Key Files 【公钥】 (Zwen 【中英文】) {
Software to edit: WordPad
ZW: ZW_public_key_2021Apr.txt
EN: EN_public_key_2021Apr.txt
Copy & Paste the above-mentioned TXT contents to file *.pub in the same filename but not the extension.
ZW: ZW_public_key_2021Apr.pub
EN: EN_public_key_2021Apr.pub
Key Distribution at Si-space using SW: OneDrive, Google Drive, 百度云
HW tool: On-and-Off switches for Si-spaces at flash drives, hard disks, modems, drives at net clouds, patent offices (#PO = n).
Number of faulty nodes, m = floor((n - 1)/3)) according to Byzantine Agreement Protocol (BAP).
Software to Sign & Verify: Mobile ECC v2
Key Management using SW on multihash keys: 2D Key PW1000 or PW100
}
Key Establishment (big memorizable secrets) {
File preparation on PW100 or PW1000: Call_000-999.txt | PW100.rtf | PW1000.rtf
For cryptographic, information-hiding, and non-cryptographic applications, especially MePKC.
Types of offline accounts like asymmetric private key, stego-key, symmetric watermarking key, asymmetric watermarking private key, and PRNG seed.
For MePKC cryptographic applications like encryption, signature, authentication, key exchange.
Classical digital signature scheme in 1976 and many other variants: blind signature, multisignature, group-oriented signature, threshold signature, and hereby multihash signature.
Multihash signature (aka object-designated signature) on usages of this variant: Some new message management functions, which are to trace a file downloaded from different mirror sites, to referee an advertiser broadcasting the news of a sponsor, and to monitor the leaking source that publicly discloses a classified digital file such as will, contract, form, etc.
Lot of variants carrying out certain specific functions, away from classical digital signature scheme: blind signature (Chaum, 1982, 1988), multisignature (Itakura & Nakamura, 1983; Boyd, 1989; Harn & Kresler, 1989), group-oriented signature (Desmedt, 1987), undeniable signature (Chaum & van Antwerpen, 1989), threshold signature (Desmedt & Frankel, 1989), fail-stop signature (Pfitzmann & Waidner, 1990; Pfitzmann, 1996), group signature (Chaum & van Heyst, 1991), proxy signature (Mambo, Usuda & Okamoto, 1996), signcryption (Zheng, 1997), and forward-secure signature (Bellare & Miner, 1999).
Margaret Thatcher’s Strategies: One of the many applications of secret is to assign a particular message with particular object like meaning, function, or recipient. For instance (Cox, Miller, Bloom & Fridrich, 2006), to prevent and trace the public disclosure of government documents by the press, Margaret Thatcher, who was British former Prime Minister in the 1980s, inserted certain unique number of white spaces (aka blanks) as secret in documents distributed to different cabinet ministers, so as to identify the document recipients who have disclosed the documents to the press. This is a type of covert text watermarking with recipient-designated message. Recipients of cabinet ministers here are designated objects for the message of distributed government documents.
Object-designated messages using object-designated signature scheme with optional properties of anonymity and non-repudiation called “multihash signature”. Here, multiple hashes are processed to be generated from a single message. This is possible by using different rounds of hash iteration. These unique hashes are then signed by a private key to create multiple digital signatures that can be verified using the same public key. This new variant of classical digital signature scheme has a few new functions in term of better message management and control.
}
This page contains Chinese characters.
E. & O. E. = Errors and Omissions Exempted
E. & O. E., + E. = Errors and Omissions Exempted, plus Estimations
(免责于可能有的错误、遗漏及估计失准。)
*** ZongJie ***