Apologies, I meant to send it to [messaging], not [curves]. I don't think this 
is very applicable to this list (I just have them both go to the same folder 
and didn't notice I picked the wrong email address to send to).

--
Please do not email me anything that you are not comfortable also sharing with 
the NSA.

On Mar 25, 2015, at 7:43 PM, Tao Effect <[email protected]> wrote:

> Dionysis Zindros came up with the following mechanism to prevent DNSChain 
> servers from forging blockchain data (copied from our blog post):
> 
> 3. Use Proof-of-Transition (PoT). PoT is a simple but powerful idea that 
> Dionysis Zindros came up with (which we plan to elaborate on in future work). 
> Briefly: clients store the public key fingerprints of the blockchain 
> transaction that corresponds to a domain. These correspond to the public key 
> that was used to update the blockchain entry. When a new SSL/TLS cert is 
> seen, require DNSChain to provide proof in the form of the transaction(s) 
> that were used to update the blockchain entry. If these transaction(s) were 
> signed by the original public key, we can be assured that DNSChain is not 
> cooking the books.
> 
> From "Certificate transparency on blockchains"
> 
> https://blog.okturtles.com/2015/03/certificate-transparency-on-blockchains/
> 
> Greg
> 
> --
> Please do not email me anything that you are not comfortable also sharing 
> with the NSA.
> 
> _______________________________________________
> Curves mailing list
> [email protected]
> https://moderncrypto.org/mailman/listinfo/curves

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Curves mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/curves

Reply via email to