Apologies, I meant to send it to [messaging], not [curves]. I don't think this is very applicable to this list (I just have them both go to the same folder and didn't notice I picked the wrong email address to send to).
-- Please do not email me anything that you are not comfortable also sharing with the NSA. On Mar 25, 2015, at 7:43 PM, Tao Effect <[email protected]> wrote: > Dionysis Zindros came up with the following mechanism to prevent DNSChain > servers from forging blockchain data (copied from our blog post): > > 3. Use Proof-of-Transition (PoT). PoT is a simple but powerful idea that > Dionysis Zindros came up with (which we plan to elaborate on in future work). > Briefly: clients store the public key fingerprints of the blockchain > transaction that corresponds to a domain. These correspond to the public key > that was used to update the blockchain entry. When a new SSL/TLS cert is > seen, require DNSChain to provide proof in the form of the transaction(s) > that were used to update the blockchain entry. If these transaction(s) were > signed by the original public key, we can be assured that DNSChain is not > cooking the books. > > From "Certificate transparency on blockchains" > > https://blog.okturtles.com/2015/03/certificate-transparency-on-blockchains/ > > Greg > > -- > Please do not email me anything that you are not comfortable also sharing > with the NSA. > > _______________________________________________ > Curves mailing list > [email protected] > https://moderncrypto.org/mailman/listinfo/curves
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ Curves mailing list [email protected] https://moderncrypto.org/mailman/listinfo/curves
