On 22 August 2013 10:36, Phillip Hallam-Baker <hal...@gmail.com> wrote:

> Preventing key substitution will require a combination of the CT ideas
> proposed by Ben Laurie (so catenate proof notaries etc) and some form of
> 'no key exists' demonstration.

We have already outline how to make verifiable maps as well as verifiable
logs, which I think is all you need.
The cryptography mailing list

Reply via email to