[cryptography] phishing/password end-game (Re: Why anon-DH ...)

dan at geer.org dan at geer.org
Wed Jan 16 21:21:43 EST 2013


 > To clarify:  I think everyone and everything should be identified by 
 > their public key,...

Would re-analyzing all this in a key-centric model rather than
a name-centric model offer any insight?  (key-centric meaning
that the key is the identity and "Dan" is an attribute of that
key; name-centric meaning that Dan is the identity and the key
is an attribute of that name)

--dan




More information about the cryptography mailing list