The answer is no. We're going to talk about a cryptographic protocol that does this.
But actually achieving what we want depends on lots of other things.
It depends on people.
It depends on assumptions about the adversary, knowing what capabilities the participants have
as well as any eavesdropper might have,
as well as building the system that actually runs the protocol.
These are all things we're not going to talk about.
What we are going to talk about is a protocol that, given the right answers
to these questions, could provide this property.
