On Sat, 13 Jan 2001, dmolnar wrote:
1) To post a message, sender S takes a 2-dollar coin and then uses some kind of verifiable secret sharing protocol to split it into shares. <snip>
4) If a group agent thinks the message is spam, it sends its share to Engineers Sans Frontiers or whoever.
No central server now, just needs a verifiable secret sharing scheme. Pedersen has one,
Cite, or URL? A verifiable secret sharing protocol could solve a *LOT* of protocol problems and I want to read it closely. (Thanks in advance for any pointers...)
and another is part of the Proactive Security work I mentioned previously.
On Byzantine Agreements? I have run into references to the topic, but it was never really clear what Byzantine Agreement really means. Bear