1993-06-30 - Re: REMAIL: problems

Header Data

From: smb@research.att.com
To: zane@genesis.mcs.com (Sameer)
Message Hash: 1f25d6a79a8db95e77318a8662eb064611e28fb0651824ed7704fb466dc7f61d
Message ID: <9306300320.AA15034@toad.com>
Reply To: N/A
UTC Datetime: 1993-06-30 03:20:52 UTC
Raw Date: Tue, 29 Jun 93 20:20:52 PDT

Raw message

From: smb@research.att.com
Date: Tue, 29 Jun 93 20:20:52 PDT
To: zane@genesis.mcs.com (Sameer)
Subject: Re: REMAIL: problems
Message-ID: <9306300320.AA15034@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


	 How can a key be split into 20 pieces while only requiring [any ?] 15
	 to work? Redundancy?

There are a fair number of such schemes.  The best overview is in Gus
Simmons' own chapter in ``Contemporary Cryptology:  The Science of
Information Integrity'', edited by Simmons and published last year by
IEEE Press.





Thread