Hal Finney wrote:
Ben Laurie writes:
It is possible to use blind signatures to produce anonymity-preserving
credentials
It seems to me quite obvious that someone must have thought of this
before - the question is who? Is it IP free?
David Chaum did a great deal of work in this area in
Apu Kapadia wrote:
I came across the same problem a couple of years ago (and indeed
iterated through private/public key solutions with a colleague). The
problem is that you can still give your private key to somebody else.
There's no real deterrent unless that private key is used for many
It's a bit like the idea of putting RFID tags in cash to let muggers know who
to target:
http://www.cambridge-news.co.uk/news/region_wide/2005/08/17/06967453-8002-45f8-b520-66b9bed6f29f.lpf
MOBILE phone technology is being used by thieves to seek out and steal
laptops locked in cars in
What happens to the quantum information ingested by a black hole? In 1997,
Thorne and Hawking argued that information swallowed by a black hole is
forever hidden, despite the fact that these dense objects do emit a
peculiar kind of radiation and eventually evaporate. Preskill countered
that
On Tue, Apr 04, 2006 at 06:15:48AM +0100, Ben Laurie wrote:
This illustrates a problem with multi-show credentials, that the holder
could share his credential freely, and in some cases even publish it,
and this would allow non-authorized parties to use it. To avoid this,
more complicated
Ben Laurie writes:
If I have understood your description correctly it seems to me that this
is defeated if, rather than sharing the master certificate, the bad guy
allows their friend to proxy to them for whatever proofs are required.
That way they never have to give up the precious master