Re: Announcing httpsy://, a YURL scheme

2003-07-16 Thread Ian Grigg
[EMAIL PROTECTED] wrote: A YURL aware search engine may find multiple independent references to a YURL, thus giving you parallel reporting channels, and increasing trust. Of course, this method differs from the YURL method for trust. The parallel channel method assigns a trust value to a site

trust is not associative

2003-07-16 Thread Ed Gerck
The thread Announcing httpsy://, a YURL scheme has not dealt with the issues of *order of introduction* that, however, play a major role in terms of introduction and the development of trust. Let trust be the operation *. Suppose Jon trusts a CA and has his cert issued by that CA. After the

Re: Announcing httpsy://, a YURL scheme

2003-07-16 Thread Zooko
Ed Gerck wrote: IF Alice is trusted by Bob to introduce ONLY authentic parties, yes. And that is the problem. Cryptography can't prevent Alice from telling lies about the web page that she showing to Bob. But it can prevent that Bob sees a page different than the one that Alice meant for

Looking for an N -out-of-M split algorithm

2003-07-16 Thread Jill . Ramonsky
Hi, I remember reading (many years ago) a description on some web page somewhere of an algorithm by which an arbitrary file F could be split into M pieces, such that: (1) given any N pieces, F can be reconstructed precisely, and (2) given fewer than N pieces, it is impossible to determine even a

Re: Announcing httpsy://, a YURL scheme

2003-07-16 Thread Perry E. Metzger
Ian Grigg [EMAIL PROTECTED] writes: Perry E. Metzger wrote: 1) The YURL makes key management and replacement effectively impossible. Well, I would have said it suggests a different method. Instead of regimented, hierarchical and fixed key management - an idea of poor track

Re: Announcing httpsy://, a YURL scheme

2003-07-16 Thread Trevor Perrin
At 11:26 AM 7/16/2003 -0400, Perry E. Metzger wrote: Ian Grigg [EMAIL PROTECTED] writes: [EMAIL PROTECTED] wrote: A YURL aware search engine may find multiple independent references to a YURL, thus giving you parallel reporting channels, and increasing trust. Of course, this method

RE: Announcing httpsy://, a YURL scheme

2003-07-16 Thread bear
On Wed, 16 Jul 2003 [EMAIL PROTECTED] wrote: A YURL aware search engine may find multiple independent references to a YURL, thus giving you parallel reporting channels, and increasing trust. But any single search engine is itself a single reference, regardless of how many times and contexts it

Re: Announcing httpsy://, a YURL scheme

2003-07-16 Thread Ed Gerck
Mark S. Miller wrote: At 08:48 AM 7/16/2003 Wednesday, Ed Gerck wrote: IF Alice is trusted by Bob to introduce ONLY authentic parties, yes. And that is the problem. In order for the Carol that Alice introduces Bob to to be inauthentic, there must be some prior notion of *who* Alice was

Re: Announcing httpsy://, a YURL scheme

2003-07-16 Thread Tyler Close
On Wednesday 16 July 2003 11:26, Perry E. Metzger wrote: It seems to me to be more a bad idea, fully realized. Perry, throughout this thread, you have made a number of factually incorrect statements about YURL. Never have you provided an argument to backup any of these statements. I know that

Re: Looking for an N -out-of-M split algorithm

2003-07-16 Thread bear
On Wed, 16 Jul 2003 [EMAIL PROTECTED] wrote: Hi, I remember reading (many years ago) a description on some web page somewhere of an algorithm by which an arbitrary file F could be split into M pieces, such that: (1) given any N pieces, F can be reconstructed precisely, and (2) given fewer than

RE: Looking for an N -out-of-M split algorithm

2003-07-16 Thread Wang, Steve
For large files, you might also want to take a look of the following paper Krawczyk, H. Secret sharing made short. In Advances in Cryptology -- Crypto '93. pages 136-146 See also HAC pages 539. Steve -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of

Re: Looking for an N -out-of-M split algorithm

2003-07-16 Thread Anton Stiglic
Does anyone have any idea where I might learn about this algorithm - or indeed any algorithm which does the job. Just as Perry mentioned, look into Shamir Secret Sharing. There are also implementations of this, see for example http://www.astro.gla.ac.uk/users/norman/distrib/tontine.html (I'm