From: smb@research.att.com
To: zane@genesis.mcs.com (Sameer)
Message Hash: 1f25d6a79a8db95e77318a8662eb064611e28fb0651824ed7704fb466dc7f61d
Message ID: <9306300320.AA15034@toad.com>
Reply To: N/A
UTC Datetime: 1993-06-30 03:20:52 UTC
Raw Date: Tue, 29 Jun 93 20:20:52 PDT
From: smb@research.att.com
Date: Tue, 29 Jun 93 20:20:52 PDT
To: zane@genesis.mcs.com (Sameer)
Subject: Re: REMAIL: problems
Message-ID: <9306300320.AA15034@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
How can a key be split into 20 pieces while only requiring [any ?] 15
to work? Redundancy?
There are a fair number of such schemes. The best overview is in Gus
Simmons' own chapter in ``Contemporary Cryptology: The Science of
Information Integrity'', edited by Simmons and published last year by
IEEE Press.
Return to June 1993
Return to “smb@research.att.com”
1993-06-30 (Tue, 29 Jun 93 20:20:52 PDT) - Re: REMAIL: problems - smb@research.att.com