On Tue, May 11, 2004 at 09:10:35PM +, Jason Holt wrote:
> [...] issue [...] would be how you actually get your certs to the
> other guy. Hidden credentials, as Ninghui pointed out, assume you
> have some means for creating the other guy's cert,
> [...]
> The OSBE paper, OTOH, assumes we're goi
wrote:
> Anyway the who goes 1st problem definition has my interest piqued: I
> am thinking this would be a very practically useful network protocol
> for privacy, if one could find a patent-free end-2-end secure (no
> server trust), efficient solution. Another desirable feature I thin