Hey guys,
I think your paper has quite a lot of errors. Therefore, I will not read anymore since it becomes rubbish.
Last issue on your paper is as follows:
See the security analysis of Rod
Forum: 2009 Reports
Dear Vahid & Yaser
Let me continue asking for further questions: You say that the security of your protocol comes from the security of Okamoto's protocol.
Note that in the first phase CA sends Cer
Forum: 2009 Reports
Dear Authors of 2009/424,
I have two problems to be answered! I will try to be more precise in this email.
About the first problem (page 11):
There is a sentence on page 11: "In our scheme th
Forum: 2009 Reports