这是一份nottingham诺丁汉大学COMP3077作业代写的成功案例
$$
\begin{array}{ccc}
\text { Alice } & & \text { Bob } \
a & \stackrel{[a] G}{\longrightarrow} & {[a] G} \
{[b] G} & \stackrel{[b] G}{\longleftrightarrow} & b
\end{array}
$$
Alice can now compute
$$
K_{A}=[a]([b] G)=[a b] G
$$
and Bob can now compute
$$
K_{B}=[b]([a] G)=[a b] G .
$$
COMP3077 COURSE NOTES :
INPUT: Message $m$ and public key $Y$.
OUTPUT: The ciphertext $(U, c, r)$.
- Choose $k \in_{R}{1, \ldots, q-1}$.
- $U \leftarrow[k] G$.
- $T \leftarrow[k] Y$.
- $\left(k_{1} | k_{2}\right) \leftarrow K D(T, l)$.
- Encrypt the message, $c \leftarrow E_{k_{1}}(m)$.
- Compute the MAC on the ciphertext, $r \leftarrow M A C_{k_{2}}(c)$.
- Dutput $(U, c, r)$.