1994-06-12 - Re: Protocol Wanted!!

Header Data

From: Ben.Goren@asu.edu
To: greg@ideath.goldenbear.com
Message Hash: f05c8c823278b90a27b1e3157672217f2c05366af457945ed0deef30a3453f17
Message ID: <9406121810.AA01329@Tux.Music.ASU.Edu>
Reply To: N/A
UTC Datetime: 1994-06-12 18:09:53 UTC
Raw Date: Sun, 12 Jun 94 11:09:53 PDT

Raw message

From: Ben.Goren@asu.edu
Date: Sun, 12 Jun 94 11:09:53 PDT
To: greg@ideath.goldenbear.com
Subject: Re: Protocol Wanted!!
Message-ID: <9406121810.AA01329@Tux.Music.ASU.Edu>
MIME-Version: 1.0
Content-Type: text/plain


I'm surprised nobody's mentioned yet that Bruce Schneier solves this
problem in chapters five and six of _Applied Cryptography._ See especially
page 90, "Noninteractive Zer-Knowledge Proofs."

b&

--
Ben.Goren@asu.edu, Arizona State University School of Music
 net.proselytizing (write for info): Protect your privacy; oppose Clipper.
 Voice concern over proposed Internet pricing schemes. Stamp out spamming.
 Finger ben@tux.music.asu.edu for PGP 2.3a public key.







Thread