[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: found nym-differentiation! Still need perpetual motion, FTL travel, cold fusion
-----BEGIN PGP SIGNED MESSAGE-----
The entity calling itself "Perry Metzger" <[email protected]> is alleged to
have written:
(> Bryce wrote:)
> > Simple as pie, because of some of the properties of DC-Nets.
> > If someone sends out the wrong number of pubkeys, then
> > everyone will know, right? So when that happens everyone
> > just reveals their shared-secret data from the DC-Net
> > session.
>
> And if several people lie about their shared secrets?
If some of your N participants are going to collude to share
their nyms then it is manifestly impossible to stop them.
But that doesn't bother me. The purpose of this scheme is
to create N nyms for N people and be sure that each of then
N people who wanted a nym got one. If you are sure that
each of the N people wanted a nym, then you can be sure you
have a one-to-one mapping between people and nyms, but
unconditional untraceability from nyms to people.
But perhaps what you were talking about was a
denial-of-service attack on the DC-Net's network layer.
That has been addressed extensively in Chaum's original
"Dining Cryptographers" paper. Chaum's method for dealing
with denial-of-service attacks is typically brilliant, but
even so it is an unwieldly and expensive (in terms of
computation and bandwidth) proposition. I recommend "Dining
Cryptographers" to everyone, and I hope that someone who
reads it will come up with a better solution.
Regards,
Bryce
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i
Comment: Auto-signed under Unix with 'BAP' Easy-PGP v1.1b2
iQB1AwUBMZWjDEjbHy8sKZitAQEjvAMAq2wCpK+yGUf21bASjiaOYDAPNF8C/ogn
HAqVnOYmYQMLUTqff7E+oC8uyUj+uoaQ0Fev8uzQdZZROXtbXx+Ej7gBzBFDrbp1
9mohBEWgbYS28hJH9+X3aoyYm/9wT+HX
=xA+6
-----END PGP SIGNATURE-----