* James A. Donald: > I figured that the obvious solution to all this was to deploy zero > knowledge technologies, where both parties prove knowledge of the > shared secret without revealing the shared secret.
Keep in mind that one party runs the required software on a computed infected with spyware and other kinds of Trojan horses. This puts the effectiveness of zero-knowledge proofs into question. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]