No free spam
Amir Herzberg
AMIR at newgenpay.com
Sun Jun 3 02:12:30 EDT 2001
James A. Donald said,
> Amir Herzberg:
> > The similarity seems to be only that both are not relying on
> > identity certificates. But otherwise it's quite a different
> > approach. In our system, we establish trust by building a graph
> > from available certificates and other credentials of different
> > entities in the network, and rules for assigning roles to
> > secret-key holders based on their certificates/credentials and
> > the role of the issuers of each. This raises a non-trivial, but
> > feasible, computational problem, resulting in assigning roles
> > to the requestor (as well as to all the issuers of
> > certificates/credentials of the requestor).
>
> I do not find this explanation intelligible. There had
> better be a more intelligible explanation available
> somewhere, because if the users do not understand it, they
> will not use it.
I apologize for the e-mail description being not clear enough. May I
recommend that if you are interested, please read some of the papers we
published on this, available from my site (below) or following `trust
establishment` from www.hrl.il.ibm.com.
Best regards,
Amir Herzberg
CTO, NewGenPay Inc.
http://www.newgenpay.com/Amir/Herzberg.htm
SMS (urgent only!): _subject_ of email to aherzberg at walla.co.il
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list