--
On Wed, 26 Jul 2000, Eugene Leitl wrote:
 > > Clearly, you can maintain a secure connection to an anonymous
 > > party.

At 08:08 AM 7/27/2000 +0000, amanda wrote:
 > No you cannot. If Bob is anonymous then it is impossible for Alice
 > to know if her secure connection goes to Bob or Mitch.

Probably what Eugene means is that one can maintain a secure connection to 
a nymous party.

IMPP server ids normally look like email ids.

Though one might not know that [EMAIL PROTECTED] was the really an aide 
to president clinton, one could use cryptographic means to ensure that it 
was the same deep throat as gave you the good information last time, and 
not a Clinton plumber checking for leaks.

Crypto Kong <www.jim.com/jamesd/Kong> is an example of a purely nymous 
protocol.

The proposed IMPP security protocol 
<http://catalog.com/jamesd/kong/secure_video.htm> is not purely nymous, 
since one could look at Deepthroat's face and possibly recognize him, but 
it is not a true name protocol, since anyone could create an account called 
[EMAIL PROTECTED], if no other BillGates got there first.

Verisign is an example of a true name protocol.

All three protocols use public keys, but they use them to prove different 
things about the identity of the person one is talking to.

We have an accepted terminology for protocols like that of Crypto Kong -- 
nym based.

We have an accepted terminology for protocols like that of Verisign "true 
names", (an unenthusiastic minority prefer the terminology "Mark of the 
beast".)

We will need a new terminology for the protocol I have proposed.  I propose 
to call it "face based".

     --digsig
          James A. Donald
      6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
      EebeJcUrCnomop+HVlb67oO16fgvJ2Ncu1EgdT2I
      4WvqXU6X/MzeDKbKw7nWWoDSLWxj5oy30+ptrZx+P


Reply via email to