Re: Encrypted chat - Anonymous identification protocol

New Message Reply About this list Date view Thread view Subject view Author view

bram (bram@gawth.com)
Tue, 1 Sep 1998 11:49:50 -0700 (PDT)


On 1 Sep 1998, Ray Jones wrote:

> if the number of possible secrets is small, then both of these methods
> fall to a dictionary attacks, though in the second case, Bob has to
> spend quite a while on the phone.

That's the problem - in the application I mentioned, there's a very small
number of messages which it's very likely that either Alice or Bob might
have (to say 'pass', they simply make up some random garbage for their
secret key, effectively making the chances of a match zero.)

I think it might be necessary to resort to secure circuit evaluation. Does
anybody know how practical that is? Hal Finney showed at crypto '98 that
it's possible to do a zero knowledge proof of sha1 inversion in only 6
megs, which I find rather amazing.

-Bram


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:13:58