[11597] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Cryptographic privacy protection in TCPA

daemon@ATHENA.MIT.EDU (Ben Laurie)
Mon Sep 2 12:48:59 2002

Date: Mon, 02 Sep 2002 13:06:40 +0100
From: Ben Laurie <ben@algroup.co.uk>
To: Nomen Nescio <nobody@dizum.com>
Cc: cypherpunks@lne.com, cryptography@wasabisystems.com

Nomen Nescio wrote:
> Some of the claims seem a little broad, like this first one:
> 
> 
>>1. A method for establishing a pseudonym system by having a certificate
>>authority accepting a user as a new participant in said pseudonym system,
>>the method comprising the steps of: receiving a first public key provided
>>by said user; verifying that said user is allowed to join the system;
>>computing a credential by signing the first public key using a secret
>>key owned by said certificate authority; publishing said first public
>>key and said credential.
> 
> 
> Wouldn't this general description cover most proposed credential systems
> in the past, such as those by Chaum or Brands?

Or, indeed, X.509.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post