From: tcmay@got.net (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: de1c35f89d025e96167ec3dd4730900e8ab3492659cec794aff7042ce68cbc04
Message ID: <ac7de719050210049b11@[205.199.118.202]>
Reply To: N/A
UTC Datetime: 1995-09-15 02:28:55 UTC
Raw Date: Thu, 14 Sep 95 19:28:55 PDT
From: tcmay@got.net (Timothy C. May)
Date: Thu, 14 Sep 95 19:28:55 PDT
To: cypherpunks@toad.com
Subject: Re: Explaining Zero Knowledge to your children
Message-ID: <ac7de719050210049b11@[205.199.118.202]>
MIME-Version: 1.0
Content-Type: text/plain
At 6:18 PM 9/14/95, Hadmut Danisch wrote:
>There is a paper about explaining Zero Knowledge methods in simple
>words. It's titled "Explainig Zero Knowledge Authentication to your
>children" or something similar. It's said to be in the proceedings of
>any conference. Does anybody know where to find it?
Schneier describes the "cave" analogy in his book, on p. 85, and gives a
reference:
Quisquater, Guilou, Berson, "How to Explain Zero-Knowledge Protocols to
your Children," Advances in Cryptology--CRYPTO '89 Proceedings.
The paper is only a couple of pages long and would make a nice scan project
for someone, as it has no equations.
But Schneier is the easiest way to read up on it.
--Tim May
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
tcmay@got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero
Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^756839 | black markets, collapse of governments.
"National borders are just speed bumps on the information superhighway."
Return to September 1995
Return to “tcmay@got.net (Timothy C. May)”