On Wed, 10 Apr 2002, Adam Back wrote:

> You don't need the minter's secret key to identify the double-spender.
> Anyone who happens to see two coin transcripts answering different
> challenges with the same coin private key can recover all the
> attributes of the coin, including the identity attribute.
> 
> This is described on p23 of [1].
> 
> Adam
> 
> [1] "A Technical Overview of Digital Credentials", Stefan Brands, 
> to appear International Journal on Information Security
> 
> http://www.xs4all.nl/~brands/overview.pdf

Not everyone agrees with Brands that these credentials work.  There's a
group called "PKILAB" that's trying to make access/credentials to work
across large organizations, and they kind of dismiss it.  I haven't really
sat down with them to find out why, but in general they feel that there's
some high level conceptual problems.  I wish I had time to read all this
stuff!!  But thanks for the pointers, at least I've got it copied so I
can read a page or so when I get a chance.

Patience, persistence, truth,
Dr. mike


Reply via email to