Hjalmar Peters
1 min readMay 10, 2019

--

.. using a different e value of Carol’s choosing. Peggy would then have to replay this simulation over and over as new verifiers show up.

It might be worth mentioning that, should Peggy perform these replays using the same R, she would leak her private Key x.

--

--

Hjalmar Peters
Hjalmar Peters

Written by Hjalmar Peters

Crypto trader, effective altruist, vegan, occasionally enjoys poker, physics and climbing

No responses yet