authentication protocols
John Saylor
johns at worldwinner.com
Mon Mar 25 18:14:04 EST 2002
Hi
I'd like to find an authentication protocol that fits my needs:
1. 2 [automated] parties
2. no trusted 3rd party intemediary ['Trent' in _Applied_Crypto_]
Most of the stuff in _Applied_Crypto_ requires that third party. It may
be an impossible task, nothing seems obvious to me. Pointers,
suggestions, or aphorisms all welcome.
--
\js "innovate scalable infomediaries"
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list