On Wed, 17 Sep 2003, David Schwartz wrote:
> In fact, you could just use an RSA public key as the identifier directly. > This is likely not the best algorithm, but it's certainly an existence proof > that such algorithms can be devised without difficulty. > > In fact, I'm going to call my patent attorney instead of sending this > email. ;) Too late. The details can be found in my final report for the US Army SBIR program for developing "Security for Open Architecture Web-Centric Systems". :) --vadim
