On Sun, Aug 01, 2010 at 11:20:51PM +1200, Peter Gutmann wrote:
But, if you query an online database, how do you authenticate its answer? If
you use a key for that or SSL certificate, I see a chicken-and-egg problem.
What's your threat model?
My threat model is practice.
I assume Perry
(In a threshold cryptosystem, the shares would be used in a protocol to
perform the desired cryptographic operation [e.g., signing] without ever
reconstructing the real secret.) Has real threshold cryptography never
been used anywhere?
Yes, the root key for the SET consortium was done
On Aug 1, 2010, at 10:34 AM, Henrique de Moraes Holschuh wrote:
(Please keep all CCs).
On Sun, 01 Aug 2010, Jerry Leichter wrote:
file might be reused: Stir in the date and time and anything else
that might vary - even if it's readily guessable/detectable - along
Well, yes, we have several
Thierry Moreau thierry.mor...@connotech.com writes:
With the next key generation for DNS root KSK signature key, ICANN may have
an opportunity to improve their procedure.
What they do will really depend on what their threat model is. I suspect that
in this case their single biggest threat was
On 07/28/2010 08:55 AM, Anne Lynn Wheeler wrote:
disclaimer: the inventor of domain name infrastructure did a stint at the
science center a decade earlier
... working on various and sundry projects.
other public key science center trivia; former RSA CEO also at science center
...