Hello Jason:
>"Page 193 and 210 do talk about having an identifying
>value encoded in the credentials which the holder can
>prove is or isn't the same as in other credentials. However,
>the discussion on page 193 is with respect to building
>digital pseudonyms"
No, not at all. The paragraph o
(Re: my paper at http://eprint.iacr.org/2002/151/ )
Stefan Brands wrote:
> - The system is subject to a simple attack. The problem lies with the
> multiplication of the hashes. Let's take the Chaum blinding as an
[...]
(For our readers at home, that was the vulnerability I mentioned in
Stefan Brands writes regarding http://eprint.iacr.org/2002/151/:
> The paper shows some promise but, apart from being insecure, has other
> drawbacks that should be addressed:
>
> ... My work... introduced by myself... my MIT press book...
>
> In addition to various other drawbacks pointed out by
Some comments on this paper comparing efficiency, and functionality
with Camenisch, Chaum, Brands.
On Tue, Oct 29, 2002 at 11:49:21PM +, Jason Holt wrote:
> http://eprint.iacr.org/2002/151/
>
> It mentions how to use the blinding technique Ben Laurie describes
> in his Lucre paper, which I do
I've submitted a pre-print of my anonymous credential system to the IACR
ePrint server. Thanks to all of you who responded to the questions I posted
here while working on it. I'd love to hear feedback from any and all before I
sumbit it for publication; particularly, I want to make sure I haven'