For background on 3-pass protocols, see [1]<p>This could have some holes, so I'm putting it out there to see if anyone can poke some in it, or seeing if it can stand up. It's flexible enough that it can encompass a family of ways of doing this -- but I'll consider it defeated if there's a fundamental flaw with the central idea of using AONTs to confound adversaries attacks. My plan with this is, if it does work out, not to patent it, but just to implement it securely under MIT license.<p>[1]: <a href="https://en.wikipedia.org/wiki/Three-pass_protocol" rel="nofollow">https://en.wikipedia.org/wiki/Three-pass_protocol</a>