1996-02-28 - Re: Diffie-Hellman for Matchmaking?

Header Data

From: lmccarth@cs.umass.edu
To: cypherpunks@toad.com (Cypherpunks Mailing List)
Message Hash: b41338696780ca8e1d61161c47de5c802153a0355c6a56cf2e6b7727f6bd0026
Message ID: <199602281351.IAA08954@opine.cs.umass.edu>
Reply To: <313395CB.4343@dcs.rhbnc.ac.uk>
UTC Datetime: 1996-02-28 14:16:51 UTC
Raw Date: Wed, 28 Feb 1996 22:16:51 +0800

Raw message

From: lmccarth@cs.umass.edu
Date: Wed, 28 Feb 1996 22:16:51 +0800
To: cypherpunks@toad.com (Cypherpunks Mailing List)
Subject: Re: Diffie-Hellman for Matchmaking?
In-Reply-To: <313395CB.4343@dcs.rhbnc.ac.uk>
Message-ID: <199602281351.IAA08954@opine.cs.umass.edu>
MIME-Version: 1.0
Content-Type: text/plain


Dimitris Tsapakidis writes:
> Person A is interested to match person B, so he computes
> g^(AB)mod n. B is interested in X, where X may or may not
> be A, and calculates g^(BX)mod n. Now, they compare these
> two "common keys" either using some Zero Knowledge scheme
> that ensures fairness (at no point one party has significantly
> more information than the other) or through a Trusted Third Party.
> If they are the same, then this means X=A, so A and B
> have a match (e.g. a date). The common keys must remain
> secret (hence the ZK above): if g^(BX)mod n "escaped"
> to the public, then the real X would find out that
> B is interested in him.

Could you give us some background on the problem ?  I'm not clear on what
the protocol is trying to achieve in practical terms.

-Lewis





Thread