From: Hal <hfinney@shell.portal.com>
To: cypherpunks@toad.com
Message Hash: 2fcb9870cea89fa17c26c57cc74b1aab229c4b5db2ea2dfaaceb44f56755640b
Message ID: <199412091700.JAA03881@jobe.shell.portal.com>
Reply To: <199412082010.OAA00148@omaha.omaha.com>
UTC Datetime: 1994-12-09 17:01:02 UTC
Raw Date: Fri, 9 Dec 94 09:01:02 PST
From: Hal <hfinney@shell.portal.com>
Date: Fri, 9 Dec 94 09:01:02 PST
To: cypherpunks@toad.com
Subject: Re: cut & choose
In-Reply-To: <199412082010.OAA00148@omaha.omaha.com>
Message-ID: <199412091700.JAA03881@jobe.shell.portal.com>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
Alex Strasheim <alex@omaha.com> writes:
>I don't understand why anyone would use the cut and choose protocol over
>denominated keys. Chaum's method seems a lot cleaner to me and more
>secure. It obviously uses less bandwidth. What am I missing here?
Schneier's examples are meant to be instructional in nature rather than
practical, showing how it would be done with paper envelopes and such.
The only example he has which is cryptographic is the "off-line" version
where Alice's identity is encoded in the cash in such a way that it is
revealed if she double-spends. Chaum's off-line protocol also relies on
cut and choose for this (Chaum, Fiat, Naor, Crypto 88). That is the
major improvement in Brands' scheme, that you don't have to use cut and
choose for his off-line cash system.
Hal
-----BEGIN PGP SIGNATURE-----
Version: 2.6
iQBVAwUBLuiNKxnMLJtOy9MBAQH1HgH/SycFuvD/vud4ZHUU8b8WDV+KgsfoyxbT
4Immhq478EcLhbLPrjriinyue17lc4fChQDPhm7Wg/i3w9rkaQQwGg==
=hyg3
-----END PGP SIGNATURE-----
Return to December 1994
Return to “mccoy@io.com (Jim McCoy)”