Benne,

With Voltage, all communications corresponding to the same public key can be
decrypted using the same private key, even if the user is offline. To me, this
sounds worse than the PKC problem of trusting the recipient's key. Voltage
also corresponds to mandatory key escrow, as you noted, with all its drawbacks.

Cheers,
Ed Gerck

Weger, B.M.M. de wrote:

Hi Ed,

What about ID-based crypto: the public key can be any string, such as
your e-mail address. So the sender can encrypt even before the
recipient has a key pair. The private key is derived from the ...

--------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to