[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] Minor edits.



Update of /home2/freehaven/cvsroot/doc/pynchon-gate
In directory moria:/tmp/cvs-serv4481

Modified Files:
	pynchon.pdf pynchon.tex 
Log Message:
Minor edits.


Index: pynchon.pdf
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/pynchon-gate/pynchon.pdf,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -d -r1.4 -r1.5
Binary files /tmp/cvsalyZex and /tmp/cvsjj1ygP differ

Index: pynchon.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/pynchon-gate/pynchon.tex,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -d -r1.67 -r1.68
--- pynchon.tex	20 Sep 2004 12:34:56 -0000	1.67
+++ pynchon.tex	4 Jul 2005 15:13:53 -0000	1.68
@@ -462,6 +462,10 @@
 bucket pools for a reasonable window of time, to be sure that all clients
 have time to download their messages.
 
+Since it is not necessary for every distributor to be operational at the given point 
+that a client wishes to retrieve mail, the system handles distributor node failure in a 
+graceful manner.
+
 \subsubsection{The PIR Protocol}
 \label{subsec:protocol-design}
 This simple PIR protocol allows a client to retrieve a
@@ -527,11 +531,7 @@
 means~\cite{nym-alias-net,wagner,helsingius,jap-backdoor,jap-pr}, or may
 attempt to surreptitiously obtain information about nym holders.
 
-We limit these effects of these attacks by greedily encrypting
-encrypt incoming messages and deleting encryption keys. % Nym holders do not
-%communicate directly with the nym server, and the nym server is not
-%entrusted with any identifying information for the user.
-All sensitive data is deleted as the bucket pool is generated,
+We limit these effects of these attacks by greedily encrypting incoming messages and deleting encryption keys. All sensitive data is deleted as the bucket pool is generated,
 ensuring that the collator has as little information
 useful to an attacker as possible.
 
@@ -953,6 +953,9 @@
 %interface. The most secure system provides no value if it is not used.
 %
 \section{Acknowledgments}
+
+Len Sassaman's work was supported in part by the EU within the PRIME Project under contract IST-2002-507591.
+
 We thank Russell O'Connor for review of several candidate
 PIR systems; Adam Back for optimizations on the message request
 protocol; Lucky Green for valuable comments; Ben Laurie for review of an

***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxx with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/