-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathWinterNitz.java
More file actions
51 lines (39 loc) · 1.83 KB
/
WinterNitz.java
File metadata and controls
51 lines (39 loc) · 1.83 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
import java.math;
import java.util;
public static clientKey {
KeyPairGenerator cbArgs = notes sent(with a txn)/ log(w) - log(w-1)/ log(w) + 1
cbArgs.ByteArrayStream.enqueue() ;
cbByte [] = Cipher.getIstance("AES", publicKey);
w = SUM(ModuleW([wi...,wn]))
Array<>byte.init(cbArgs);
BufferedOutputStream eclient = FileInputStream(add(cbByte));
}
public static Verify(String[] args) {
CipherCache clientSignature [cbByte];
Hash pubKey = Array<>pubKey;
ByteArray pubKeyHash [ serverArgsx...serverArgsn];
for clientSecurity.getIndex[xi] {pubKeyHash[xi] ;
int start = 0;
while (true) {
int index = str.indexOf(0);
if (xi = 0) {
pubKey.ByteArray(n) == clientTxns(xi, 0);
pubKey(n++) >> clientTxns.getIndex(xi++) - clientTxns.getIndex(xi - xin);
}
index++;
return beta = pubKey.Array.getIndex();
index l = 0;
l++;
for pubKey.Array() == index
{clientSignature pbg(w - 1) = (cbByte.getIndexOf(i); i++, i==l);
pba(x) = pbg - beta * y(x); } //y(x) instance of DH privkey ByteLength x a public DHkey
Parser forSign = hashCode(bg, 0) >> return pubKey.length() == hashCode.length();
if pubKey.length() < beta {return false;}
else import FileInputStream(OP_MSG) //transfer to compiler code
Cipher OPMSG = cipher.init(AES)
{OPMSG.getInstance.ByteArrayLenght(OP_MSG, 1); for OPMSG.lenghth <= 0;
{forSign(getFront(OPMSG) - getEnd(OPMSG) == OPMSG.length) >> B.getIndexOf(0) = { pubKey.getIndexOf(k) > 2^(w-b)=[bi...bn];}} //are memory in Box cache of MsgTxns for blockchain merkel root}
if B[0] * pba >= beta return null;
else ModuleK[0] << K(x) = beta - 1 - (B[0] * pba(OPMSG) * pba(x));
{if K(x) = 6 = y return null; else return K(x).pushModule;}
}}}