Is there a concrete use case for this that someone could explain to me?

How does an encrypting party know what URL to use to get the key to
encrypt? I assume some out-of-band exchange. How would key rolling work
then? An an encrypting party would need to a priori know all potential
x5u's of the decrypting party? Which seems dubious. And how would the
decrypting party signal a desired change of keys?

Am I missing something obvious here?
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to