http://www.w3.org/ns/prov#value | - The problem becomes particularly challenging when two parties (the prover A and the verifier B) are adversaries, and one wants to make it impossible for B to misrepresent himself as A even after he witnesses and verifies arbitrarily many proofs of identity generated by A. Typical applications includes passports (which are often inspected and photocopied by hostile governments), credit cards (whose
|