Re: Publications of the Second xenc Candidate Recs

Joseph,

I'm sorry for not replying sooner.

>> 2. In Step 3 of decryptNodeSet() in Section 3.1, a step saying that Y is
>> replaced with Y U {Od} is missing between Steps 1 and 2.
>
>You're right, but I'm not sure that's enough given this is a recursive
>function. I've also prepended the following to the last step, "If Od
>contains xenc:EncryptedData that are not in E." Is that correct?

"Replace Y with Y ∪ Od" in Step 2 is not correct because Y is a set of
node-sets while Od is just a node-set.  This would be "Replace Y with Y ∪
{Od}".  Also, the text you added, i.e., "If Od contains xenc:EncryptedData
that are not in E" does not seem to be necessary.  If this condition is
true, decryptNodeSet() just returns an empty set, so it would be OK.

>> 4. In Section 3.4.4, a KeyInfo structure referenced by a RetrievalMethod
>> element could be included in the second and third examples.  Also, a
>> decrypted document could be added to the end.  So, examples would be as
>> follows:
>
>You're example isn't intended to be plug-and-play is it? For instance,
your
>new [a*] example has no mention of <Part number="1">, but this is still in

>[c*], which you didn't give a replacement for? While we could demonstrate
>that dsig:RetrievalMethod could be used, I'm not sure we need to
>demonstrate that here; and I'm not sure what you mean by "decrypted
>document could be added to the end." So given my confusion I won't
>introduce any changes to the example, though if you and Merlin want to
give
>me the html to replace it, I'll happily do so!

Are you talking about the examples in Section 3.3?  This comment is not for
them but for the ones in Section 3.4.4, where the relation between
references and super-encryption is described.

Thanks,
Takeshi IMAMURA
Tokyo Research Laboratory
IBM Research
imamu@jp.ibm.com

Received on Saturday, 14 September 2002 23:11:04 UTC