From: Ben.Goren@asu.edu
To: greg@ideath.goldenbear.com
Message Hash: f05c8c823278b90a27b1e3157672217f2c05366af457945ed0deef30a3453f17
Message ID: <9406121810.AA01329@Tux.Music.ASU.Edu>
Reply To: N/A
UTC Datetime: 1994-06-12 18:09:53 UTC
Raw Date: Sun, 12 Jun 94 11:09:53 PDT
From: Ben.Goren@asu.edu
Date: Sun, 12 Jun 94 11:09:53 PDT
To: greg@ideath.goldenbear.com
Subject: Re: Protocol Wanted!!
Message-ID: <9406121810.AA01329@Tux.Music.ASU.Edu>
MIME-Version: 1.0
Content-Type: text/plain
I'm surprised nobody's mentioned yet that Bruce Schneier solves this
problem in chapters five and six of _Applied Cryptography._ See especially
page 90, "Noninteractive Zer-Knowledge Proofs."
b&
--
Ben.Goren@asu.edu, Arizona State University School of Music
net.proselytizing (write for info): Protect your privacy; oppose Clipper.
Voice concern over proposed Internet pricing schemes. Stamp out spamming.
Finger ben@tux.music.asu.edu for PGP 2.3a public key.
Return to June 1994
Return to “Ben.Goren@asu.edu”
1994-06-12 (Sun, 12 Jun 94 11:09:53 PDT) - Re: Protocol Wanted!! - Ben.Goren@asu.edu