No free spam

Amir Herzberg AMIR at
Sun Jun 3 02:12:30 EDT 2001

James A. Donald said, 

> Amir Herzberg:
> > The similarity seems to be only that both are not relying on
> > identity certificates. But otherwise it's quite a different
> > approach. In our system, we establish trust by building a graph
> > from available certificates and other credentials of different
> > entities in the network, and rules for assigning roles to
> > secret-key holders based on their certificates/credentials and
> > the role of the issuers of each. This raises a non-trivial, but
> > feasible, computational problem, resulting in assigning roles
> > to the requestor (as well as to all the issuers of
> > certificates/credentials of the requestor).
> I do not find this explanation intelligible.  There had 
> better be a more intelligible explanation available 
> somewhere, because if the users do not understand it, they 
> will not use it.

I apologize for the e-mail description being not clear enough. May I
recommend that if you are interested, please read some of the papers we
published on this, available from my site (below) or following `trust
establishment` from 

Best regards, 
Amir Herzberg
CTO, NewGenPay Inc.
SMS (urgent only!): _subject_ of email to aherzberg at

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at

More information about the cryptography mailing list