1996-05-12 - Re: found nym-differentiation! Still need perpetual motion, FTL travel, cold fusion

Header Data

From: bryce@digicash.com
To: perry@piermont.com
Message Hash: 9b03b076a471e33acb8f4725a04e6f11fcb31d2e28db85a873266c6fff6478b4
Message ID: <199605120836.KAA15055@digicash.com>
Reply To: <199605112302.TAA07610@jekyll.piermont.com>
UTC Datetime: 1996-05-12 12:03:57 UTC
Raw Date: Sun, 12 May 1996 20:03:57 +0800

Raw message

From: bryce@digicash.com
Date: Sun, 12 May 1996 20:03:57 +0800
To: perry@piermont.com
Subject: Re: found nym-differentiation! Still need perpetual motion, FTL travel, cold fusion
In-Reply-To: <199605112302.TAA07610@jekyll.piermont.com>
Message-ID: <199605120836.KAA15055@digicash.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

 The entity calling itself "Perry Metzger" <perry@piermont.com> is alleged to
 have written:
(> Bryce wrote:)

> > Simple as pie, because of some of the properties of DC-Nets.
> > If someone sends out the wrong number of pubkeys, then
> > everyone will know, right?  So when that happens everyone
> > just reveals their shared-secret data from the DC-Net
> > session.
> 
> And if several people lie about their shared secrets?


If some of your N participants are going to collude to share
their nyms then it is manifestly impossible to stop them.
But that doesn't bother me.  The purpose of this scheme is
to create N nyms for N people and be sure that each of then 
N people who wanted a nym got one.  If you are sure that 
each of the N people wanted a nym, then you can be sure you 
have a one-to-one mapping between people and nyms, but
unconditional untraceability from nyms to people.


But perhaps what you were talking about was a
denial-of-service attack on the DC-Net's network layer.
That has been addressed extensively in Chaum's original
"Dining Cryptographers" paper.  Chaum's method for dealing
with denial-of-service attacks is typically brilliant, but
even so it is an unwieldly and expensive (in terms of
computation and bandwidth) proposition.  I recommend "Dining
Cryptographers" to everyone, and I hope that someone who
reads it will come up with a better solution.


Regards,

Bryce




-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i
Comment: Auto-signed under Unix with 'BAP' Easy-PGP v1.1b2

iQB1AwUBMZWjDEjbHy8sKZitAQEjvAMAq2wCpK+yGUf21bASjiaOYDAPNF8C/ogn
HAqVnOYmYQMLUTqff7E+oC8uyUj+uoaQ0Fev8uzQdZZROXtbXx+Ej7gBzBFDrbp1
9mohBEWgbYS28hJH9+X3aoyYm/9wT+HX
=xA+6
-----END PGP SIGNATURE-----





Thread