How broad is the SPEKE patent.
Florian Weimer
fw at deneb.enyo.de
Fri Nov 11 05:20:15 EST 2005
* James A. Donald:
> I figured that the obvious solution to all this was to deploy zero
> knowledge technologies, where both parties prove knowledge of the
> shared secret without revealing the shared secret.
Keep in mind that one party runs the required software on a computed
infected with spyware and other kinds of Trojan horses. This puts the
effectiveness of zero-knowledge proofs into question.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list