Is it desirable to prevent users from choosing their own circuits?
Martin Fick
mogulguy at yahoo.com
Fri Oct 2 17:18:03 UTC 2009
--- On Fri, 10/2/09, Brian Mearns <bmearns at ieee.org> wrote:
> Interestingly, "Applied Cryptography" (by Bruce Schneier)
> briefly discusses a distributed timestamping protocol that uses a
> hash of the content to be stamped in order to select which nodes will
> provide the stamp, the idea being that the requester can't simply
> choose to use nodes he controls in order to forge the timestamp.
This would likely only work if the person attempting
to timestamp something does not control what he is
attempting to timestamp in the first place. In other
words, if the attacker cannot choose his input, he
cannot force an output.
-Martin
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
More information about the tor-talk
mailing list