[14503] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Strong-Enough Pseudonymity as Functional Anonymity

daemon@ATHENA.MIT.EDU (Ian Grigg)
Sat Oct 4 15:27:11 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sat, 04 Oct 2003 15:13:43 -0400
From: Ian Grigg <iang@systemics.com>
Reply-To: iang@systemics.com
To: Zooko O'Whielacronx <zooko@zooko.com>
Cc: cryptography@metzdowd.com

Zooko O'Whielacronx wrote:

> I imagine it might be nice to have Goal B achievable in a certain setting
> where Goal A remains unachievable.

In a strictly theoretical sense, isn't this essentially
the job of the (perfect) TTP?  At least that's the way
many protocols seem to brush away the difficulty.

iang

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post