[15565] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Software Helps Rights Groups Protect Sensitive Information

daemon@ATHENA.MIT.EDU (Ben Laurie)
Mon Jun 7 00:16:25 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sun, 06 Jun 2004 18:58:49 +0100
From: Ben Laurie <ben@algroup.co.uk>
To: Ian Brown <i.brown@cs.ucl.ac.uk>
Cc: 'Ivan Krstic' <ccikrs1@cranbrook.edu>,
	cryptography <cryptography@metzdowd.com>
In-Reply-To: <03b401c447f7$8d3bd7a0$6501a8c0@happy>

Ian Brown wrote:

>>This reminds me of a question I've been meaning to ask for a while. Has
> 
> 
>>there been any research done on encryption systems which encrypt two
> 
> (or 
> 
>>n) plaintexts with n keys, producing a joint ciphertext with the 
>>property that decrypting it with key k[n] only produces the 
>>nth plaintext?
> 
> 
> See the Steganographic File System:
> http://www.mcdonald.org.uk/StegFS/

Also Rubberhose:

http://www.rubberhose.org/

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post