[1395] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: How to build anonymous storage

daemon@ATHENA.MIT.EDU (Ulf =?iso-8859-1?Q?M=F6ller?=)
Sun Aug 31 13:06:53 1997

Date: Sun, 31 Aug 97 02:11 GMT+0200
From: 3umoelle@informatik.uni-hamburg.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
To: coderpunks@toad.com, cryptography@c2.net
In-Reply-To: <87296474821615@cs26.cs.auckland.ac.nz>

>information.  It relies on the fact that although someone can prove you have 
>(potentially) vast amounts of encrypted data, they can't prove you have the 
>key to decrypt it, and conversely, you can provide a reasonably convincing 
>"proof" that you don't have the key to decrypt it.

There was a remarkable followup by Bryan Olson describing a
duress-resistant file system design.

The post is reproduced at http://www.sevenlocks.com/papers/crypto/duress.txt

home help back first fref pref prev next nref lref last post