authentication protocols

John Saylor johns at worldwinner.com
Mon Mar 25 18:14:04 EST 2002


Hi

I'd like to find an authentication protocol that fits my needs:
1. 2 [automated] parties
2. no trusted 3rd party intemediary ['Trent' in _Applied_Crypto_]

Most of the stuff in _Applied_Crypto_ requires that third party. It may
be an impossible task, nothing seems obvious to me. Pointers,
suggestions, or aphorisms all welcome.

-- 
\js	"innovate scalable infomediaries"

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list