* James A. Donald:
> Is there a way of constructing a digital signature so
> that the signature proves that at least m possessors of
> secret keys corresponding to n public keys signed, for n
> a dozen or less, without revealing how many more than m,
> or which ones signed?
What about this?
Ch
On Fri, Nov 14, 2008 at 01:26:29PM +, [EMAIL PROTECTED] wrote:
> (snicker) from the local firefox
>
>
> en-us.add-ons.mozilla.com:443 uses an invalid security certificate.
>
> The certificate is not trusted because the issuer certificate is not trusted.
>
> (Error code: sec_error_untru
Hal Finney wrote:
> I think it is necessary that nodes keep a separate
> pending-transaction list associated with each candidate chain.
> ... One might also ask ... how many candidate chains must
> a given node keep track of at one time, on average?
Fortunately, it's only necessary to keep a pe
http://online.wsj.com/article/SB122660908325125509.html
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
(snicker) from the local firefox
en-us.add-ons.mozilla.com:443 uses an invalid security certificate.
The certificate is not trusted because the issuer certificate is not trusted.
(Error code: sec_error_untrusted_issuer)
--bill
--
Here's a pointer to the new release
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/index.htm
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]