Mike Stay (staym@accessdata.com)
Fri, 21 Aug 1998 16:24:32 -0600
Oops! There's a hole in this: Alice could include the PK's of people she
doesn't want to talk to but still wants to know who Bob is. Then when
Bob sends his identity, she sends trash.
Never mind.
>Here's a very expensive protocol, but I think it works:
>Alice & Bob each encrypt a random # with the PK's of all the folks they
>want to talk to & exchange the results. Only if they both want to talk
>to each other will they both have the two random numbers which can be
>used to make a session key for exchanging identities.
-- Mike Stay Cryptographer / Programmer AccessData Corp. mailto:staym@accessdata.com
The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:11:00