1996-08-05 - The Dining Cryptographers in the Disco

Header Data

From: Laszlo Vecsey <master@internexus.net>
To: cypherpunks@toad.com
Message Hash: 71c10d56ccffc23bd1b359371ae2f349c727c0fd7a83273442a8a0b824dfdf48
Message ID: <Pine.LNX.3.92.960805062336.6658B-100000@micro.internexus.net>
Reply To: N/A
UTC Datetime: 1996-08-05 12:48:44 UTC
Raw Date: Mon, 5 Aug 1996 20:48:44 +0800

Raw message

From: Laszlo Vecsey <master@internexus.net>
Date: Mon, 5 Aug 1996 20:48:44 +0800
To: cypherpunks@toad.com
Subject: The Dining Cryptographers in the Disco
Message-ID: <Pine.LNX.3.92.960805062336.6658B-100000@micro.internexus.net>
MIME-Version: 1.0
Content-Type: text/plain


There is a protocol for anonymous message broadcast which supposedly
detects disruption, can someone tell me how it works? Applied Cryptography
lists a reference to "Advances in Cryptology, Crypto '89 Preceedings"
(page 690) but I dont have a copy of it, I'd appreciate it if someone
could fill me in on what it says.

Thanks!

- Lester






Thread