[11597] in cryptography@c2.net mail archive
Re: Cryptographic privacy protection in TCPA
daemon@ATHENA.MIT.EDU (Ben Laurie)
Mon Sep 2 12:48:59 2002
Date: Mon, 02 Sep 2002 13:06:40 +0100
From: Ben Laurie <ben@algroup.co.uk>
To: Nomen Nescio <nobody@dizum.com>
Cc: cypherpunks@lne.com, cryptography@wasabisystems.com
Nomen Nescio wrote:
> Some of the claims seem a little broad, like this first one:
>
>
>>1. A method for establishing a pseudonym system by having a certificate
>>authority accepting a user as a new participant in said pseudonym system,
>>the method comprising the steps of: receiving a first public key provided
>>by said user; verifying that said user is allowed to join the system;
>>computing a credential by signing the first public key using a secret
>>key owned by said certificate authority; publishing said first public
>>key and said credential.
>
>
> Wouldn't this general description cover most proposed credential systems
> in the past, such as those by Chaum or Brands?
Or, indeed, X.509.
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com