[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] More typo corrections, clarified ACKs.



Update of /home2/freehaven/cvsroot/doc/pynchon-gate
In directory moria.mit.edu:/tmp/cvs-serv18990

Modified Files:
	pynchon.tex 
Log Message:
More typo corrections, clarified ACKs.


Index: pynchon.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/pynchon-gate/pynchon.tex,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -d -r1.4 -r1.5
--- pynchon.tex	26 Jan 2004 10:15:31 -0000	1.4
+++ pynchon.tex	26 Jan 2004 11:33:59 -0000	1.5
@@ -155,12 +155,15 @@
 \subsubsection{Re-encryption mixes}
 
 Re-encryption mixes~\cite {universal} aim to improve the reliability of
-anonymous information retrieval. While they do improve on the robustness
-of simple reply blocks, reliability problems are still possible.
-Re-encryption mixes require that the security vs. reliability tradeoffs be
-made by the sender at the time that the message is sent. A more desirable
-property would be to allow the recipient to make security determinations
-at the time the message is retrieved.
+anonymous message systems. Recent work has shown that re-encryption mixes
+can be used to facilitate anonymous message replies~\cite
+{reusable-channels}. While reusable anonymous return channels in
+re-encryption mixes do improve on the robustness of simple reply blocks in
+a Chaumian mix-net, reliability problems are still possible. Re-encryption
+mixes require that the security vs. reliability tradeoffs be made by the
+sender at the time that the message is sent. A more desirable property
+would be to allow the recipient to make security determinations at the
+time the message is retrieved.
 
 Mix-nets inherently rely upon cryptographic primitives for their security.
 While the cryptographic primitives utilized in traditional Chaumian
@@ -282,7 +285,8 @@
 \subsection{The Pynchon Gate Client}
 
 The \emph{Pynchon Gate Client} application resides on the nym owner's
-local computer, and periodically retrieves messages from the distributor
+local computer, and periodically 
+retrieves messages from the distributor
 nodes using the Pynchon Gate Client Protocol.
 
 The Pynchon Gate Client Protocol is as follows: The client application
@@ -440,7 +444,7 @@
 to implement our prototype as an application which runs in the background
 and retrieves messages from the distribution nodes at fixed intervals. The
 application will provide a local POP3 server interface so that the user
-need only configure his existing mail client to retrive mail from his
+need only configure his existing mail client to retrieve mail from his
 local machine over POP3. Multiple nyms can be managed in this manner, and
 the user will only need to interact directly with our prototype when
 configuring new nyms, or addressing client warnings regarding abnormal
@@ -469,7 +473,7 @@
 interface. The most secure system is worth nothing if it is not
 used.
 
-\section{Acknowledgements}
+\section{Acknowledgments}
 
 We would like to thank Russell O'Connor, for review of several candidate
 PIR systems; Adam Back, for his optimization on the message request
@@ -478,8 +482,9 @@
 Dingledine, and Sonia Ara\~na, for proof-reading and comments on the
 paper. Finally, thanks to the many members of the Cypherpunks mailing list
 who have contributed much to the field of anonymity research, in
-particular Jim McCoy, whose anonymous mailbox system's architecture bears
-similarity to The Pynchon Gate components.
+particular Jim McCoy, who has done substantial work in the area of
+alternative designs for pseudonymous message retrieval.
+
 
 \bibliographystyle{plain}
 \bibliography{pynchon}

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/