add some cryptography stuff

This commit is contained in:
Aly 2025-09-12 09:16:05 -06:00
parent 3bc9811e25
commit c0c42524de
7 changed files with 30 additions and 0 deletions

View file

@ -0,0 +1,4 @@
# Computational DiffieHellman
- computational version of [[decisional-diffie-hellman|Decisional DiffieHellman]]
- given a generator $`g`$ and uniformly selected $`\left(g^a, g^b\right)`$, compute $`g^{ab}`$

View file

@ -0,0 +1,4 @@
# Decisional DiffieHellman
- decisional version of [[computational-diffie-hellman|Computational DiffieHellman]]
- given a generator $`g`$ and uniformly selected $`\left(g^a, g^b\right)`$, discriminate $`g^{ab}`$ from a different group value $`c`$

4
ket.md Normal file
View file

@ -0,0 +1,4 @@
# Ket
- $`\ket{u}`$ where $`u`$ is the _name_ of a _state_
- [[push]] [[column-vector|Column Vector]]

4
np-complete.md Normal file
View file

@ -0,0 +1,4 @@
# NP Complete
- a problem that all other [[np|NP]] problems can be reduced to
- if you can solve the decision version in P-time, you can solve all decision problems in [[np|NP]] in P-time

4
np-hard.md Normal file
View file

@ -0,0 +1,4 @@
# NP Hard
- may not necessarily be in [[np|NP]]
- computational version of [[np-complete|NP Complete]]

5
np.md Normal file
View file

@ -0,0 +1,5 @@
# NP
- class of languages whose membership proofs can be verified in polynomial time
- the [[discrete-log|Discrete Log]] problem is an example of an NP problem
- from $`g^x`$ in a finite field it is hard to compute $`\log_g\left(g^x\right)`$, but easy to check $`g^x = g^y`$ to validate a knowledge proof of $`x`$

View file

@ -0,0 +1,5 @@
# Probabilistic Polynomial Time
- for a given problem, a PPT algorithm for the problem runs in P-time, with a high (likely non-one) probability of giving the correct answer
- takes randomness as an input
- impossible to guarantee the real solution without running the algorithm on all possible randomness (NP)