REMAIL: problems

smb at research.att.com smb at research.att.com
Tue Jun 29 20:20:52 PDT 1993


	 How can a key be split into 20 pieces while only requiring [any ?] 15
	 to work? Redundancy?

There are a fair number of such schemes.  The best overview is in Gus
Simmons' own chapter in ``Contemporary Cryptology:  The Science of
Information Integrity'', edited by Simmons and published last year by
IEEE Press.






More information about the cypherpunks-legacy mailing list