How broad is the SPEKE patent.

Florian Weimer fw at deneb.enyo.de
Fri Nov 11 05:20:15 EST 2005


* James A. Donald:

> I figured that the obvious solution to all this was to deploy zero 
> knowledge technologies, where both parties prove knowledge of the 
> shared secret without revealing the shared secret.

Keep in mind that one party runs the required software on a computed
infected with spyware and other kinds of Trojan horses.  This puts the
effectiveness of zero-knowledge proofs into question.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list