* James A. Donald:

> I figured that the obvious solution to all this was to deploy zero 
> knowledge technologies, where both parties prove knowledge of the 
> shared secret without revealing the shared secret.

Keep in mind that one party runs the required software on a computed
infected with spyware and other kinds of Trojan horses.  This puts the
effectiveness of zero-knowledge proofs into question.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to