| http://www.w3.org/ns/prov#value | - iginally setup), then, for any ID, this adversary can perform whatever the legitimate KGC would have done on request of a user's private key from a user pretending to be entitled to the ID, only skipping the demonstration of being entitled to the ID; then the adversary can perform whatever the user legitimately entitled to the ID would have done, including deciphering anything enciphered with the
|