home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.theory:2482 sci.math:15273 sci.crypt:5054
- Newsgroups: comp.theory,sci.math,sci.crypt
- Path: sparky!uunet!stanford.edu!CSD-NewsHost.Stanford.EDU!Xenon.Stanford.EDU!fahn
- From: fahn@Xenon.Stanford.EDU (Paul Fahn)
- Subject: Re: Cryptography and P=NP
- Message-ID: <1992Nov20.053816.4128@CSD-NewsHost.Stanford.EDU>
- Sender: news@CSD-NewsHost.Stanford.EDU
- Organization: Computer Science Department, Stanford University.
- References: <1992Nov17.043640.5525@CSD-NewsHost.Stanford.EDU> <Nov.19.01.26.05.1992.11158@remus.rutgers.edu> <1992Nov20.000916.29325@CSD-NewsHost.Stanford.EDU>
- Date: Fri, 20 Nov 1992 05:38:16 GMT
- Lines: 19
-
- In article <1992Nov20.000916.29325@CSD-NewsHost.Stanford.EDU> pratt@Sunburn.Stanford.EDU (Vaughan R. Pratt) writes:
- >
- >
- >Are the following terms acceptable?
- >
- >
- >1. I, Vaughan Pratt, agree that if P is not equal to NP then I will
- >pay you, Chris Long, $1000 on demand. You agree that if P is equal to
- >NP then you will pay me $10,000 on demand.
- >
-
- [ other terms of contract ]
-
- >
-
- And now for the important questions: what digital signature method shall
- be used to bind the parties to the contract? What certifying authority
- shall be used to verify that the public keys used to sign actually belong
- to the individuals in question?
-