Is there a concrete use case for this that someone could explain to me? How does an encrypting party know what URL to use to get the key to encrypt? I assume some out-of-band exchange. How would key rolling work then? An an encrypting party would need to a priori know all potential x5u's of the decrypting party? Which seems dubious. And how would the decrypting party signal a desired change of keys?
Am I missing something obvious here?
_______________________________________________ jose mailing list [email protected] https://www.ietf.org/mailman/listinfo/jose
