81:
202:
22:
142:'s 1978 article "A method for obtaining digital signatures and public-key cryptosystems." They wrote, "For our scenarios we suppose that A and B (also known as Alice and Bob) are two users of a public-key cryptosystem". Previous to this article, cryptographers typically referred to message senders and receivers as A and B, or other simple symbols. In fact, in the two previous articles by Rivest, Shamir, and Adleman, introducing the
72:. As the use of Alice and Bob became more widespread, additional characters were added, sometimes each with a particular meaning. These characters do not have to refer to people; they refer to generic agents which might be different computers or even different programs running on a single computer.
171:
together. They live on opposite coasts, communicate mainly by telephone, and use their computers to transact business over the telephone." In 1984, John Gordon delivered his famous "After Dinner Speech" about Alice and Bob, which he imagines to be the first "definitive biography of Alice and Bob."
170:
Although Alice and Bob were invented with no reference to their personality, authors soon began adding colorful descriptions. In 1983, Blum invented a backstory about a troubled relationship between Alice and Bob, writing, "Alice and Bob, recently divorced, mutually distrustful, still do business
254:
The most common characters are Alice and Bob. Eve, Mallory, and Trent are also common names, and have fairly well-established "personalities" (or functions). The names often use alliterative mnemonics (for example, Eve, "eavesdropper"; Mallory, "malicious") where different players have different
174:
In addition to adding backstories and personalities to Alice and Bob, authors soon added other characters, with their own personalities. The first to be added was Eve, the "eavesdropper." Eve was invented in 1988 by
Charles Bennet, Gilles Brassard, and Jean-Marc Robert, in their paper, "Privacy
851:
A significant challenge with understanding climate change is the abstract nature of the problem, and the difficulty in relating it to personal actions and consequences. The names Alice and Bob have been used in this context to illustrate emissions and climate consequences on a personal level.
88:
Alice and Bob are the names of fictional characters used for convenience and to aid comprehension. For example, "How can Bob send a private message M to Alice in a public-key cryptosystem?" is believed to be easier to describe and understand than if the hypothetical people were simply named
2141:
Farbod
Khoshnoud, Maziar Ghazinejad, Automated quantum entanglement and cryptography for networks of robotic systems, IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA), IDETC-CIE 2021, Virtual Conference: August 17 – 20, DETC2021-71653,
838:
In experiments involving robotic systems, the terms "Alice Robot" and "Bob Robot" refer to mobile platforms responsible for transmitting quantum information and receiving it with quantum detectors, respectively, within the context of the field of
834:
The names Alice and Bob are often used to name the participants in thought experiments in physics. More alphabetical names, usually of alternating gender, are used as required, e.g. "Alice and Bob (and Carol and Dick and Eve)".
2235:
Farbod
Khoshnoud, Marco B. Quadrelli, Enrique Galvez, Clarence W. de Silva, Shayan Javaherian, B. Bahr, M. Ghazinejad, A. S. Eddin, M. El-Hadedy, Quantum Brain-Computer Interface, ASEE PSW, 2023, in press.
1709:
Mallet represents an active adversary that not only listens to all communications between Alice and Bob but can also modify the contents of any communication he sees while it is in transit.
163:
began his 1981 paper, "Bob and Alice each have a secret, SB and SA, respectively, which they want to exchange." Early on, Alice and Bob were starting to appear in other domains, such as in
504:), who can modify messages, substitute messages, or replay old messages. The difficulty of securing a system against a Mallory is much greater than against an Eve.
2152:
Khoshnoud, Farbod; Aiello, Clarice; Quadrelli, Bruno; Ghazinejad, Maziar; De Silva, Clarence; Khoshnoud, Farbod; Bahr, Behnam; Lamata, Lucas (April 23, 2021).
167:'s 1981 article, "Coin Flipping by Telephone: A Protocol for Solving Impossible Problems," which begins, "Alice and Bob want to flip a coin by telephone."
2109:
Lamata, Lucas; Quadrelli, Marco B.; de Silva, Clarence W.; Kumar, Prem; Kanter, Gregory S.; Ghazinejad, Maziar; Khoshnoud, Farbod (October 12, 2021).
1983:
1413:
Cho, Hyunghoon; Ippolito, Daphne; Yun
William Yu (2020). "Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs".
1678:
Mallet maintains the illusion that Alice and Bob are talking to each other rather than to him by intercepting the messages and retransmitting them.
2301:
A short history of Bobs (story and slideshow) in the computing industry, from Alice & Bob to
Microsoft Bob and Father of Ethernet Bob Metcalfe
2009:
Frazier, Matthew; Taddese, Biniyam; Antonsen, Thomas; Anlage, Steven M. (February 7, 2013). "Nonlinear Time
Reversal in a Wave Chaotic System".
1070:
1447:. Lecture Notes in Computer Science. Vol. 10, 210. University of Pennsylvania and INRIA, CNRS, University of Lorraine. pp. 202–231.
823:. Additionally, Arthur, given the same outcome, prefers a game to take the fewest moves, while Bertha prefers a game to take the most moves.
255:
motives. Other names are much less common and more flexible in use. Sometimes the genders are alternated: Alice, Bob, Carol, Dave, Eve, etc.
424:. For example, Grace may try to force Alice or Bob to implement backdoors in their protocols. Grace may also deliberately weaken standards.
1209:
Cattaneoa, Giuseppe; De
Santisa, Alfredo; Ferraro Petrillo, Umberto (April 2008). "Visualization of cryptographic protocols with GRACE".
56:
in their 1978 paper "A Method for
Obtaining Digital Signatures and Public-key Cryptosystems". Subsequently, they have become common
2300:
2330:
1854:
2290:
2270:
1942:
1928:
1640:
1535:
1470:
1397:
1298:
367:, who is usually a passive attacker. While they can listen in on messages between Alice and Bob, they cannot modify them. In
1085:
2158:. 2021 ASEE Pacific Southwest Conference - "Pushing Past Pandemic Pedagogy: Learning from Disruption". ASEE Conferences.
1647:
Mallet can intercept Alice's database inquiry, and substitute his own public key for Alice's. He can do the same to Bob.
1764:
148:
2170:
1967:
1733:
1702:
1671:
819:
Arthur is the "left", "black", or "vertical" player, and Bertha is the "right", "white", or "horizontal" player in a
241:
2320:
861:
763:
Merlin provides answers, and Arthur asks questions. Merlin has unbounded computational ability (like the wizard
1251:
Bennett, Charles H.; Brassard, Gilles; Robert, Jean-Marc (1988). "Privacy
Amplification by Public Discussion".
223:
219:
2340:
270:
The original, generic characters. Generally, Alice and Bob want to exchange a message or cryptographic key.
115:
Scientific papers about thought experiments with several participants often used letters to identify them:
159:. Cryptographers would often begin their academic papers with reference to Alice and Bob. For instance,
146:, there is no mention of Alice and Bob. The choice of the first three names may have come from the film
2325:
876:
820:
802:
155:
Within a few years, however, references to Alice and Bob in cryptological literature became a common
2183:
964:
1817:
1740:
We model key choices of Alice, Bob and adversary Mallet as independent random variables A, B and M
745:
501:
2285:
2335:
1607:
871:
212:
1812:
1555:
959:
37:
2182:
Khoshnoud, Farbod; Esat, Ibrahim I.; de Silva, Clarence W.; Quadrelli, Marco B. (April 2019).
950:(February 1, 1978). "A Method for Obtaining Digital Signatures and Public-key Cryptosystems".
107:
such as "Mallory" for "malicious" to associate the name with the typical role of that person.
1389:
633:, who usually uses a large number of identities. For example, Sybil may attempt to subvert a
40:, and in other science and engineering literature where there are several participants in a
2028:
1327:
912:
595:
368:
61:
767:). In interactive proof systems, Merlin claims the truth of a statement, and Arthur (like
8:
2096:
2092:
663:
2032:
1331:
594:
to show that the intended transaction has actually taken place. Peggy is often found in
2211:
2052:
2018:
1911:
1850:"Arthur-Merlin games: A randomized proof system, and a hierarchy of complexity classes"
1830:
1659:
1577:
1476:
1448:
1414:
1358:
1315:
1268:
1191:
1147:
1064:
985:
453:
156:
143:
41:
2294:
2215:
2203:
2074:
2044:
1963:
1938:
1868:
1849:
1834:
1760:
1752:
1729:
1698:
1667:
1636:
1531:
1466:
1393:
1363:
1345:
1294:
977:
658:
634:
314:
2056:
1915:
1581:
1480:
1195:
1151:
25:
Example scenario where communication between Alice and Bob is intercepted by
Mallory
2195:
2159:
2122:
2040:
2036:
1903:
1863:
1822:
1567:
1458:
1353:
1335:
1272:
1260:
1218:
1181:
1137:
1103:
989:
969:
902:
840:
786:
160:
2267:
1891:
1438:; Thomé, Emmanuel (2017). "A Kilobit Hidden SNFS Discrete Logarithm Computation".
347:
A generic fifth participant, but rarely used, as "E" is usually reserved for Eve.
2274:
2246:
2097:
Journal of Mechatronic Systems and Control, Volume 49, Issue 3, pp. 124-131, 2021
2070:
1690:
1502:
1383:
1052:
1026:
947:
764:
613:
139:
53:
2127:
2110:
1932:
1462:
915:
896:
470:
who may be called upon to resolve a potential dispute between participants. See
1628:
1595:
1523:
1435:
1286:
1222:
866:
546:
534:
Used as an alternative to the eavesdropper Eve in several South Asian nations.
392:, courier or intermediary. Faythe is used infrequently, and is associated with
176:
2199:
1907:
1599:
97:
as in "How can B send a private message M to A in a public-key cryptosystem?"
2314:
2207:
1887:
1349:
981:
733:, who is an insider with privileged access capable of divulging information.
729:
713:
555:
363:
1783:
1142:
1125:
790:
32:
are fictional characters commonly used as placeholders in discussions about
2048:
1883:
1800:
1721:
1367:
638:
550:, who responds to queries from other participants. Olivia often acts as a "
101:
80:
33:
2279:
2091:
Farbod Khoshnoud, Lucas Lamata, Clarence W. De Silva, Marco B. Quadrelli,
1826:
1237:
1186:
1169:
973:
400:. Faythe may be a repository of key service or courier of shared secrets.
1803:; et al. (1992). "Algebraic Methods for Interactive Proof Systems".
1165:
1121:
785:
Paul asks questions, and Carole provides answers. In the solution of the
768:
164:
130:
The first mention of Alice and Bob in the context of cryptography was in
65:
2164:
1771:
Suppose Alice and Bob wish to exchange keys, and Darth is the adversary.
1572:
1316:"Efficient multiuser quantum cryptography network based on entanglement"
1551:
1439:
1372:
An example from quantum cryptography with Alice, Bob, Carol, and David.
1126:"Coin Flipping by Telephone a Protocol for Solving Impossible Problems"
1048:
1044:
1022:
1018:
943:
939:
520:
500:. Unlike the passive Eve, Mallory is an active attacker (often used in
471:
226: in this section. Unsourced material may be challenged and removed.
135:
131:
49:
45:
2268:
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
1340:
1784:"A Collaborative Access Control Framework for Online Social Networks"
907:
628:
551:
57:
1264:
1110:. Aiken Computation Lab, Harvard University. Technical Report TR-81.
1007:. Santa Barbara California: Instructional Horizons, Inc. p. 10.
201:
21:
1453:
1419:
1208:
104:
2151:
2023:
2093:
Quantum Teleportation for Control of Dynamic Systems and Autonomy
1633:
Applied Cryptography: Protocols, Algorithms, and Source Code in C
1528:
Applied Cryptography: Protocols, Algorithms, and Source Code in C
794:
388:
69:
1984:"Alice and Bob communicate without transferring a single photon"
1291:
Applied Cryptography: Protocols, Algorithms and Source Code in C
798:
2181:
2153:
2184:"Quantum Network of Cooperative Unmanned Autonomous Systems"
2108:
2008:
2262:
1556:"Formalizing and Securing Relationships on Public Networks"
1757:
Cryptography and Network Security: Principles and Practice
100:
The names are conventional, and where relevant may use an
2282:, given at the Zurich Seminar, April 1984, by John Gordon
1412:
2305:
2155:
Modernizing Mechatronics course with Quantum Engineering
1433:
319:
often encountered in situations with stored passwords.
1033:. Cambridge MA: Massachusetts Institute of Technology.
16:
Characters used in cryptography and science literature
1250:
572:, similar to Mallory, but not necessarily malicious.
518:
Used as an alternative to the eavesdropper Eve, from
84:
An example of an "Alice and Bob" used in cryptography
801:") answered them. Paul and Carole were also used in
554:" with some concealed state or information, or as a
1043:
1017:
938:
60:in many scientific and engineering fields, such as
1031:On Digital Signatures and Public-Key Cryptosystems
302:A third participant, usually of malicious intent.
452:, mentioned first by Ian Grigg in the context of
2312:
1314:Xue, Peng; Wang, Kunkun; Wang, Xiaoping (2017).
1086:"Security's inseparable couple: Alice & Bob"
44:. The Alice and Bob characters were invented by
1726:Algorithmic Aspects of Wireless Sensor Networks
1518:
1516:
1108:How to exchange secrets with oblivious transfer
1882:
1057:Cryptographic Communications System and Method
438:for cryptographic standards, but rarely used.
1927:
1745:
1683:
1385:Distributed Systems: Principles and Paradigms
2069:
1621:
1513:
739:
1848:Babai, László; Moran, Shlomo (April 1988).
1652:
1313:
1211:Journal of Visual Languages & Computing
1847:
1069:: CS1 maint: location missing publisher (
2244:
2163:
2126:
2022:
1934:Data Streams: Algorithms and Applications
1867:
1816:
1751:
1714:
1689:
1571:
1452:
1418:
1381:
1357:
1339:
1185:
1141:
963:
906:
894:
612:who appears for interactions that desire
242:Learn how and when to remove this message
1896:Combinatorics, Probability and Computing
1627:
1594:
1522:
1285:
191:
175:Amplification by Public Discussion." In
79:
20:
2245:Rasmussen, Carl Edward (July 4, 2024).
1855:Journal of Computer and System Sciences
1658:
1441:Advances in Cryptology – EUROCRYPT 2017
1238:"The Alice and Bob After Dinner Speech"
2313:
1957:
1610:from the original on December 22, 2021
1530:(Second ed.). Wiley. p. 23.
1293:. Hoboken, NJ: John Wiley & Sons.
1235:
1002:
888:
805:, in the roles of pusher and chooser.
771:), questions him to verify the claim.
2280:The Alice and Bob After-Dinner Speech
1720:
1550:
1500:
1102:
1083:
898:Internet Security Glossary, Version 2
186:
149:Bob & Carol & Ted & Alice
1962:. CRC Press. pp. 71, 175, 176.
1799:
1174:ACM Transactions on Computer Systems
1164:
1120:
934:
932:
930:
928:
224:adding citations to reliable sources
195:
13:
2075:"209: Notes on Special Relativity"
14:
2352:
2256:
1434:Fried, Joshua; Gaudry, Pierrick;
925:
846:
793:) asked questions and Carole (an
1501:Grigg, Ian (November 24, 2002).
200:
2238:
2229:
2175:
2145:
2135:
2102:
2085:
2063:
2002:
1976:
1951:
1921:
1876:
1841:
1793:
1776:
1697:. Addison-Wesley. p. 616.
1588:
1544:
1540:. Table 2.1: Dramatis Personae.
1494:
1427:
1406:
1375:
1307:
1279:
1244:
1229:
1202:
1170:"How to exchange (Secret) keys"
1084:Brown, Bob (February 7, 2005).
789:problem, Paul (standing in for
717:, who may guard Alice and Bob.
211:needs additional citations for
183:, other characters are listed.
2331:Thought experiments in physics
2082:An example with several names.
2041:10.1103/physrevlett.110.063902
1666:. Network Press. p. 130.
1158:
1114:
1096:
1077:
1037:
1011:
996:
697:, who requires proof from the
337:A generic fourth participant.
1:
1937:. Now Publishers. p. 3.
1892:"Three Thresholds for a Liar"
1392:. p. 171;399–402.
1382:Tanenbaum, Andrew S. (2007).
882:
410:A generic sixth participant.
371:, Eve may also represent the
288:A generic third participant.
2247:"Alice, Bob and the Climate"
1958:Conway, John Horton (2000).
1869:10.1016/0022-0000(88)90028-1
1005:Encyclopedia of Cryptography
748:there are other characters:
496:. Associated with Trudy, an
7:
2128:10.3390/electronics10202483
1463:10.1007/978-3-319-56620-7_8
1236:Gordon, John (April 1984).
862:Diffie–Hellman key exchange
855:
75:
10:
2357:
2286:Geek Song: "Alice and Bob"
2273:December 17, 2008, at the
1600:"Who are Alice & Bob?"
1223:10.1016/j.jvlc.2007.05.001
877:Security protocol notation
829:
110:
2200:10.1142/S2301385019500055
1908:10.1017/S0963548300000080
1253:SIAM Journal on Computing
1003:Newton, David E. (1997).
952:Communications of the ACM
901:. Network Working Group.
895:R. Shirey (August 2007).
746:interactive proof systems
740:Interactive proof systems
590:, who interacts with the
502:man-in-the-middle attacks
422:government representative
2306:XKCD #177: Alice and Bob
2263:History of Alice and Bob
1759:. Pearson. p. 317.
1728:. Springer. p. 67.
1059:. Cambridge MA. 4405829.
2321:Cryptographic protocols
2011:Physical Review Letters
1695:.NET Framework Security
1143:10.1145/1008908.1008911
1055:(September 20, 1983) .
872:Public-key cryptography
2111:"Quantum Mechatronics"
1662:; et al. (2000).
1598:(September 23, 2010),
85:
26:
1827:10.1145/146585.146605
1635:. Wiley. p. 44.
1503:"Ivan The Honourable"
1390:Pearson Prentice Hall
1187:10.1145/357360.357368
1124:(November 10, 1981).
974:10.1145/359340.359342
596:zero-knowledge proofs
192:Cryptographic systems
83:
24:
2341:History of computing
1960:On Numbers and Games
436:mischievous designer
369:quantum cryptography
220:improve this article
181:Applied Cryptography
62:quantum cryptography
2291:Alice and Bob jokes
2165:10.18260/1-2--38241
2033:2013PhRvL.110f3902F
1660:Perkins, Charles L.
1573:10.5210/fm.v2i9.548
1332:2017NatSR...745928X
803:combinatorial games
664:neutral third party
482:or (less commonly)
454:Ricardian contracts
1805:Journal of the ACM
1753:Stallings, William
1664:Firewalls: 24seven
1554:(September 1997).
1320:Scientific Reports
821:combinatorial game
494:malicious attacker
187:Cast of characters
86:
42:thought experiment
27:
2326:Placeholder names
2295:Quantum Computing
2073:(March 5, 2000).
1944:978-1-933019-14-7
1929:Muthukrishnan, S.
1642:978-0-471-59756-8
1537:978-0-471-11709-4
1472:978-3-319-56619-1
1399:978-0-13-239227-3
1341:10.1038/srep45928
1300:978-0-471-59756-8
1104:Rabin, Michael O.
827:
826:
737:
736:
635:reputation system
252:
251:
244:
2348:
2251:
2250:
2242:
2236:
2233:
2227:
2226:
2224:
2222:
2188:Unmanned Systems
2179:
2173:
2169:
2167:
2149:
2143:
2139:
2133:
2132:
2130:
2106:
2100:
2089:
2083:
2081:
2079:
2071:David Mermin, N.
2067:
2061:
2060:
2026:
2006:
2000:
1999:
1997:
1995:
1990:. April 16, 2013
1988:physicsworld.com
1980:
1974:
1973:
1955:
1949:
1948:
1925:
1919:
1918:
1880:
1874:
1873:
1871:
1845:
1839:
1838:
1820:
1797:
1791:
1790:
1788:
1780:
1774:
1773:
1749:
1743:
1742:
1718:
1712:
1711:
1691:LaMacchia, Brian
1687:
1681:
1680:
1656:
1650:
1649:
1625:
1619:
1618:
1617:
1615:
1592:
1586:
1585:
1575:
1548:
1542:
1541:
1520:
1511:
1510:
1498:
1492:
1491:
1489:
1487:
1456:
1446:
1431:
1425:
1424:
1422:
1410:
1404:
1403:
1379:
1373:
1371:
1361:
1343:
1311:
1305:
1304:
1283:
1277:
1276:
1248:
1242:
1241:
1233:
1227:
1226:
1206:
1200:
1199:
1189:
1162:
1156:
1155:
1145:
1118:
1112:
1111:
1100:
1094:
1093:
1081:
1075:
1074:
1068:
1060:
1041:
1035:
1034:
1015:
1009:
1008:
1000:
994:
993:
967:
936:
923:
919:
910:
908:10.17487/RFC4949
892:
841:quantum robotics
787:Twenty Questions
751:
750:
662:, who acts as a
315:password cracker
258:
257:
247:
240:
236:
233:
227:
204:
196:
144:RSA cryptosystem
2356:
2355:
2351:
2350:
2349:
2347:
2346:
2345:
2311:
2310:
2275:Wayback Machine
2259:
2254:
2243:
2239:
2234:
2230:
2220:
2218:
2180:
2176:
2150:
2146:
2140:
2136:
2107:
2103:
2090:
2086:
2077:
2068:
2064:
2007:
2003:
1993:
1991:
1982:
1981:
1977:
1970:
1956:
1952:
1945:
1926:
1922:
1881:
1877:
1846:
1842:
1798:
1794:
1786:
1782:
1781:
1777:
1767:
1750:
1746:
1736:
1719:
1715:
1705:
1688:
1684:
1674:
1657:
1653:
1643:
1629:Schneier, Bruce
1626:
1622:
1613:
1611:
1596:Schneier, Bruce
1593:
1589:
1549:
1545:
1538:
1524:Schneier, Bruce
1521:
1514:
1499:
1495:
1485:
1483:
1473:
1444:
1436:Heninger, Nadia
1432:
1428:
1411:
1407:
1400:
1380:
1376:
1312:
1308:
1301:
1287:Schneier, Bruce
1284:
1280:
1265:10.1137/0217014
1249:
1245:
1234:
1230:
1207:
1203:
1163:
1159:
1130:ACM SIGACT News
1119:
1115:
1101:
1097:
1082:
1078:
1062:
1061:
1042:
1038:
1016:
1012:
1001:
997:
965:10.1.1.607.2677
937:
926:
893:
889:
885:
858:
849:
832:
742:
614:non-repudiation
248:
237:
231:
228:
217:
205:
194:
189:
113:
78:
54:Leonard Adleman
17:
12:
11:
5:
2354:
2344:
2343:
2338:
2336:Fictional duos
2333:
2328:
2323:
2309:
2308:
2303:
2298:
2288:
2283:
2277:
2265:
2258:
2257:External links
2255:
2253:
2252:
2237:
2228:
2194:(2): 137–145.
2174:
2144:
2134:
2101:
2084:
2062:
2001:
1975:
1968:
1950:
1943:
1920:
1888:Winkler, Peter
1875:
1862:(2): 254–276.
1840:
1818:10.1.1.41.9477
1811:(4): 859–868.
1792:
1775:
1766:978-0133354690
1765:
1744:
1734:
1724:, ed. (2009).
1713:
1703:
1682:
1672:
1651:
1641:
1620:
1587:
1543:
1536:
1512:
1493:
1471:
1426:
1405:
1398:
1374:
1306:
1299:
1278:
1259:(2): 210–229.
1243:
1228:
1217:(2): 258–290.
1201:
1180:(2): 175–193.
1157:
1113:
1095:
1076:
1045:Rivest, Ron L.
1036:
1029:(April 1977).
1019:Rivest, Ron L.
1010:
995:
958:(2): 120–126.
940:Rivest, Ron L.
924:
921:Informational.
886:
884:
881:
880:
879:
874:
869:
867:Martin Gardner
864:
857:
854:
848:
847:Climate Change
845:
831:
828:
825:
824:
817:
807:
806:
783:
773:
772:
761:
741:
738:
735:
734:
725:
719:
718:
709:
703:
702:
692:
682:
681:
674:
668:
667:
653:
643:
642:
624:
618:
617:
606:
600:
599:
584:
574:
573:
566:
560:
559:
542:
536:
535:
532:
526:
525:
516:
506:
505:
490:
476:
475:
464:
458:
457:
446:
440:
439:
432:
426:
425:
418:
412:
411:
408:
402:
401:
383:
377:
376:
359:
349:
348:
345:
339:
338:
335:
321:
320:
310:
304:
303:
300:
290:
289:
286:
272:
271:
268:
250:
249:
208:
206:
199:
193:
190:
188:
185:
177:Bruce Schneier
112:
109:
77:
74:
15:
9:
6:
4:
3:
2:
2353:
2342:
2339:
2337:
2334:
2332:
2329:
2327:
2324:
2322:
2319:
2318:
2316:
2307:
2304:
2302:
2299:
2296:
2292:
2289:
2287:
2284:
2281:
2278:
2276:
2272:
2269:
2266:
2264:
2261:
2260:
2248:
2241:
2232:
2217:
2213:
2209:
2205:
2201:
2197:
2193:
2189:
2185:
2178:
2172:
2166:
2161:
2157:
2156:
2148:
2138:
2129:
2124:
2120:
2116:
2112:
2105:
2098:
2094:
2088:
2076:
2072:
2066:
2058:
2054:
2050:
2046:
2042:
2038:
2034:
2030:
2025:
2020:
2017:(6): 063902.
2016:
2012:
2005:
1989:
1985:
1979:
1971:
1969:9781568811277
1965:
1961:
1954:
1946:
1940:
1936:
1935:
1930:
1924:
1917:
1913:
1909:
1905:
1901:
1897:
1893:
1889:
1885:
1884:Spencer, Joel
1879:
1870:
1865:
1861:
1857:
1856:
1851:
1844:
1836:
1832:
1828:
1824:
1819:
1814:
1810:
1806:
1802:
1801:Lund, Carsten
1796:
1785:
1779:
1772:
1768:
1762:
1758:
1754:
1748:
1741:
1737:
1735:9783642054334
1731:
1727:
1723:
1722:Dolev, Shlomi
1717:
1710:
1706:
1704:9780672321849
1700:
1696:
1692:
1686:
1679:
1675:
1673:9780782125290
1669:
1665:
1661:
1655:
1648:
1644:
1638:
1634:
1630:
1624:
1609:
1605:
1601:
1597:
1591:
1583:
1579:
1574:
1569:
1565:
1561:
1557:
1553:
1547:
1539:
1533:
1529:
1525:
1519:
1517:
1508:
1504:
1497:
1482:
1478:
1474:
1468:
1464:
1460:
1455:
1450:
1443:
1442:
1437:
1430:
1421:
1416:
1409:
1401:
1395:
1391:
1387:
1386:
1378:
1369:
1365:
1360:
1355:
1351:
1347:
1342:
1337:
1333:
1329:
1325:
1321:
1317:
1310:
1302:
1296:
1292:
1288:
1282:
1274:
1270:
1266:
1262:
1258:
1254:
1247:
1239:
1232:
1224:
1220:
1216:
1212:
1205:
1197:
1193:
1188:
1183:
1179:
1175:
1171:
1167:
1161:
1153:
1149:
1144:
1139:
1135:
1131:
1127:
1123:
1117:
1109:
1105:
1099:
1091:
1087:
1080:
1072:
1066:
1058:
1054:
1050:
1046:
1040:
1032:
1028:
1024:
1020:
1014:
1006:
999:
991:
987:
983:
979:
975:
971:
966:
961:
957:
953:
949:
945:
941:
935:
933:
931:
929:
922:
917:
914:
909:
904:
900:
899:
891:
887:
878:
875:
873:
870:
868:
865:
863:
860:
859:
853:
844:
842:
836:
822:
818:
816:
812:
809:
808:
804:
800:
796:
792:
788:
784:
782:
778:
775:
774:
770:
766:
762:
760:
756:
753:
752:
749:
747:
732:
731:
730:whistleblower
726:
724:
721:
720:
716:
715:
710:
708:
705:
704:
700:
696:
693:
691:
687:
684:
683:
679:
675:
673:
670:
669:
665:
661:
660:
654:
652:
648:
645:
644:
640:
636:
632:
630:
625:
623:
620:
619:
615:
611:
607:
605:
602:
601:
597:
593:
589:
585:
583:
579:
576:
575:
571:
567:
565:
562:
561:
557:
556:random oracle
553:
549:
548:
543:
541:
538:
537:
533:
531:
528:
527:
523:
522:
517:
515:
511:
508:
507:
503:
499:
495:
491:
489:
485:
481:
478:
477:
473:
469:
465:
463:
460:
459:
455:
451:
447:
445:
442:
441:
437:
433:
431:
428:
427:
423:
419:
417:
414:
413:
409:
407:
404:
403:
399:
395:
391:
390:
384:
382:
379:
378:
374:
370:
366:
365:
360:
358:
354:
351:
350:
346:
344:
341:
340:
336:
334:
330:
326:
323:
322:
318:
316:
311:
309:
306:
305:
301:
299:
295:
292:
291:
287:
285:
281:
277:
274:
273:
269:
267:
263:
260:
259:
256:
246:
243:
235:
225:
221:
215:
214:
209:This section
207:
203:
198:
197:
184:
182:
178:
172:
168:
166:
162:
161:Michael Rabin
158:
153:
151:
150:
145:
141:
137:
133:
128:
126:
122:
118:
108:
106:
103:
98:
96:
92:
82:
73:
71:
67:
63:
59:
55:
51:
47:
43:
39:
35:
34:cryptographic
31:
30:Alice and Bob
23:
19:
2240:
2231:
2221:September 7,
2219:. Retrieved
2191:
2187:
2177:
2154:
2147:
2137:
2121:(20): 2483.
2118:
2114:
2104:
2087:
2065:
2014:
2010:
2004:
1992:. Retrieved
1987:
1978:
1959:
1953:
1933:
1923:
1902:(1): 81–93,
1899:
1895:
1878:
1859:
1853:
1843:
1808:
1804:
1795:
1778:
1770:
1756:
1747:
1739:
1725:
1716:
1708:
1694:
1685:
1677:
1663:
1654:
1646:
1632:
1623:
1612:, retrieved
1603:
1590:
1563:
1560:First Monday
1559:
1546:
1527:
1506:
1496:
1484:. Retrieved
1440:
1429:
1408:
1384:
1377:
1326:(1): 45928.
1323:
1319:
1309:
1290:
1281:
1256:
1252:
1246:
1231:
1214:
1210:
1204:
1177:
1173:
1166:Blum, Manuel
1160:
1136:(1): 23–27.
1133:
1129:
1122:Blum, Manuel
1116:
1107:
1098:
1090:NetworkWorld
1089:
1079:
1056:
1053:Adleman, Len
1039:
1030:
1027:Adleman, Len
1013:
1004:
998:
955:
951:
948:Adleman, Len
920:
897:
890:
850:
837:
833:
814:
810:
780:
776:
758:
754:
743:
728:
722:
712:
706:
698:
694:
689:
685:
677:
671:
656:
650:
646:
639:Sybil attack
629:pseudonymous
627:
621:
609:
603:
591:
587:
581:
577:
569:
563:
545:
539:
529:
519:
513:
509:
497:
493:
487:
483:
479:
467:
461:
449:
443:
435:
429:
421:
415:
405:
398:faithfulness
397:
393:
386:
380:
372:
364:eavesdropper
362:
356:
352:
342:
332:
328:
324:
313:
307:
297:
293:
283:
279:
275:
265:
261:
253:
238:
229:
218:Please help
213:verification
210:
180:
173:
169:
154:
147:
129:
124:
120:
116:
114:
102:alliterative
99:
94:
90:
87:
36:systems and
29:
28:
18:
2115:Electronics
1552:Szabo, Nick
1486:October 12,
1049:Shamir, Adi
1023:Shamir, Adi
944:Shamir, Adi
769:King Arthur
373:environment
165:Manuel Blum
66:game theory
2315:Categories
1454:1610.02874
1420:2003.11511
883:References
791:Paul Erdős
695:A verifier
659:arbitrator
610:repudiator
521:microphone
472:Judge Judy
58:archetypes
50:Adi Shamir
46:Ron Rivest
2297:-related)
2216:149842737
2208:2301-3850
2024:1207.1667
1835:207170996
1813:CiteSeerX
1350:2045-2322
1240:. Zurich.
1065:cite book
982:0001-0782
960:CiteSeerX
552:black box
38:protocols
2293:(mainly
2271:Archived
2057:35907279
2049:23432243
1994:June 19,
1931:(2005).
1916:45707043
1890:(1992),
1755:(1998).
1693:(2002).
1631:(1994).
1608:archived
1582:33773111
1526:(1996).
1507:iang.org
1481:12341745
1368:28374854
1289:(2015).
1196:16304470
1168:(1983).
1152:19928725
1106:(1981).
856:See also
678:intruder
657:trusted
631:attacker
592:verifier
570:opponent
498:intruder
387:trusted
232:May 2023
179:'s book
105:mnemonic
76:Overview
2029:Bibcode
1604:YouTube
1359:5379677
1328:Bibcode
1273:5956782
990:2873616
830:Physics
795:anagram
510:Michael
480:Mallory
389:advisor
284:Charlie
140:Adleman
127:, etc.
111:History
70:physics
2214:
2206:
2055:
2047:
1966:
1941:
1914:
1833:
1815:
1763:
1732:
1701:
1670:
1639:
1614:May 2,
1580:
1534:
1479:
1469:
1396:
1366:
1356:
1348:
1297:
1271:
1194:
1150:
988:
980:
962:
815:Bertha
811:Arthur
799:oracle
781:Carole
765:Merlin
759:Merlin
755:Arthur
714:warden
707:Walter
699:prover
686:Victor
637:. See
604:Rupert
588:prover
547:oracle
540:Olivia
484:Mallet
450:issuer
381:Faythe
280:Carlos
138:, and
136:Shamir
132:Rivest
52:, and
2212:S2CID
2142:2021.
2078:(PDF)
2053:S2CID
2019:arXiv
1912:S2CID
1831:S2CID
1787:(PDF)
1578:S2CID
1566:(9).
1477:S2CID
1449:arXiv
1445:(PDF)
1415:arXiv
1269:S2CID
1192:S2CID
1148:S2CID
986:S2CID
723:Wendy
690:Vanna
672:Trudy
647:Trent
622:Sybil
578:Peggy
564:Oscar
488:Darth
468:judge
430:Heidi
416:Grace
406:Frank
394:faith
333:David
308:Craig
294:Chuck
276:Carol
262:Alice
157:trope
2223:2023
2204:ISSN
2045:PMID
1996:2017
1964:ISBN
1939:ISBN
1761:ISBN
1730:ISBN
1699:ISBN
1668:ISBN
1637:ISBN
1616:2017
1532:ISBN
1488:2016
1467:ISBN
1394:ISBN
1364:PMID
1346:ISSN
1295:ISBN
1071:link
978:ISSN
916:4949
813:and
797:of "
779:and
777:Paul
757:and
744:For
530:Niaj
514:Mike
462:Judy
444:Ivan
396:and
357:Yves
343:Erin
329:Dave
298:Chad
264:and
93:and
68:and
2196:doi
2171:PDF
2160:doi
2123:doi
2037:doi
2015:110
1904:doi
1864:doi
1823:doi
1568:doi
1459:doi
1354:PMC
1336:doi
1261:doi
1219:doi
1182:doi
1138:doi
970:doi
913:RFC
903:doi
688:or
676:An
651:Ted
649:or
582:Pat
580:or
568:An
544:An
512:or
486:or
448:An
361:An
355:or
353:Eve
331:or
325:Dan
296:or
282:or
266:Bob
222:by
2317::
2210:.
2202:.
2192:07
2190:.
2186:.
2119:10
2117:.
2113:.
2095:,
2051:.
2043:.
2035:.
2027:.
2013:.
1986:.
1910:,
1898:,
1894:,
1886:;
1860:36
1858:.
1852:.
1829:.
1821:.
1809:39
1807:.
1769:.
1738:.
1707:.
1676:.
1645:.
1606:,
1602:,
1576:.
1562:.
1558:.
1515:^
1505:.
1475:.
1465:.
1457:.
1388:.
1362:.
1352:.
1344:.
1334:.
1322:.
1318:.
1267:.
1257:17
1255:.
1215:19
1213:.
1190:.
1176:.
1172:.
1146:.
1134:15
1132:.
1128:.
1088:.
1067:}}
1063:{{
1051:;
1047:;
1025:;
1021:;
984:.
976:.
968:.
956:21
954:.
946:;
942:;
927:^
911:.
843:.
727:A
711:A
701:.
680:.
666:.
655:A
641:.
626:A
616:.
608:A
598:.
586:A
558:.
524:.
492:A
474:.
466:A
456:.
434:A
420:A
385:A
375:.
327:,
312:A
278:,
152:.
134:,
123:,
119:,
64:,
48:,
2249:.
2225:.
2198::
2168:.
2162::
2131:.
2125::
2099:.
2080:.
2059:.
2039::
2031::
2021::
1998:.
1972:.
1947:.
1906::
1900:1
1872:.
1866::
1837:.
1825::
1789:.
1584:.
1570::
1564:2
1509:.
1490:.
1461::
1451::
1423:.
1417::
1402:.
1370:.
1338::
1330::
1324:7
1303:.
1275:.
1263::
1225:.
1221::
1198:.
1184::
1178:1
1154:.
1140::
1092:.
1073:)
992:.
972::
918:.
905::
317:,
245:)
239:(
234:)
230:(
216:.
125:C
121:B
117:A
95:B
91:A
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.