On 22 August 2013 10:36, Phillip Hallam-Baker <hal...@gmail.com> wrote:

> Preventing key substitution will require a combination of the CT ideas
> proposed by Ben Laurie (so catenate proof notaries etc) and some form of
> 'no key exists' demonstration.


We have already outline how to make verifiable maps as well as verifiable
logs, which I think is all you need.
http://www.links.org/files/RevocationTransparency.pdf.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Reply via email to