5.1 Security Considerations for Implementers

There are no additional security considerations. Security assumptions for this protocol are documented in section 1.5.