The Dining Cryptographers in the Disco

Laszlo Vecsey master at internexus.net
Mon Aug 5 05:48:44 PDT 1996


There is a protocol for anonymous message broadcast which supposedly
detects disruption, can someone tell me how it works? Applied Cryptography
lists a reference to "Advances in Cryptology, Crypto '89 Preceedings"
(page 690) but I dont have a copy of it, I'd appreciate it if someone
could fill me in on what it says.

Thanks!

- Lester







More information about the Testlist mailing list