Search Transcripts
Found 2 results for "challenge-response protocol"

Authenticating Charles Hoskinson
Feb 20, 2024•26 min
... and then use the private key to authenticate. This is typically done through a challenge-response protocol. In a two-way protocol, you have Alice and Bob. Alice submits a challenge by ...

Verified Tweets
Jan 9, 2024•27 min
... then send back the plaintext message. There are many ways to implement these challenge-response protocols, and this is a simplification, but it requires access to a public-private key ...