The method of claim 46 wherein the information stored in the credential further includes secret information associated with the first party or the second party only if a predetermined personal identification number (PIN), or password, or other personal information or characteristic is used by the first party or the second party to access the secret information.