Hello Jason:
>"Page 193 and 210 do talk about having an identifying
>value encoded in the credentials which the holder can
>prove is or isn't the same as in other credentials. However,
>the discussion on page 193 is with respect to building
>digital pseudonyms"
No, not at all. The paragraph o
(Re: my paper at http://eprint.iacr.org/2002/151/ )
Stefan Brands wrote:
> - The system is subject to a simple attack. The problem lies with the
> multiplication of the hashes. Let's take the Chaum blinding as an
[...]
(For our readers at home, that was the vulnerability I mentioned in
Stefan Brands writes regarding http://eprint.iacr.org/2002/151/:
> The paper shows some promise but, apart from being insecure, has other
> drawbacks that should be addressed:
>
> ... My work... introduced by myself... my MIT press book...
>
> In addition to various other drawbacks pointed out by
(Re: my paper at http://eprint.iacr.org/2002/151/ )
Let me first point out that Dr. Stefan Brands noted an insecurity in
my system which would allow malicious users to obtain issuer signatures on
arbitrary documents.
This is due to the fact that users aren't prevented from using
The paper shows some promise but, apart from being insecure, has other
drawbacks that should be addressed:
- The system is subject to a simple attack. The problem lies with the
multiplication of the hashes. Let's take the Chaum blinding as an
example, something similar work for the "Laurie" prot
Some comments on this paper comparing efficiency, and functionality
with Camenisch, Chaum, Brands.
On Tue, Oct 29, 2002 at 11:49:21PM +, Jason Holt wrote:
> http://eprint.iacr.org/2002/151/
>
> It mentions how to use the blinding technique Ben Laurie describes
> in his Lucre paper, which I do
I've submitted a pre-print of my anonymous credential system to the IACR
ePrint server. Thanks to all of you who responded to the questions I posted
here while working on it. I'd love to hear feedback from any and all before I
sumbit it for publication; particularly, I want to make sure I haven'