1 min readMay 10, 2019
.. using a different e value of Carol’s choosing. Peggy would then have to replay this simulation over and over as new verifiers show up.
It might be worth mentioning that, should Peggy perform these replays using the same R, she would leak her private Key x.