On Wed, 10 Apr 2002, Adam Back wrote: > You don't need the minter's secret key to identify the double-spender. > Anyone who happens to see two coin transcripts answering different > challenges with the same coin private key can recover all the > attributes of the coin, including the identity attribute. > > This is described on p23 of [1]. > > Adam > > [1] "A Technical Overview of Digital Credentials", Stefan Brands, > to appear International Journal on Information Security > > http://www.xs4all.nl/~brands/overview.pdf
Not everyone agrees with Brands that these credentials work. There's a group called "PKILAB" that's trying to make access/credentials to work across large organizations, and they kind of dismiss it. I haven't really sat down with them to find out why, but in general they feel that there's some high level conceptual problems. I wish I had time to read all this stuff!! But thanks for the pointers, at least I've got it copied so I can read a page or so when I get a chance. Patience, persistence, truth, Dr. mike