Comment on binding cryptography (2)