On 30/12/2014 9:34 am, "Trevor Perrin" <[email protected]> wrote:
> (3) All devices have device-specific decryption-involved keys, and a
> master device uses a signing key to authorize subordinate devices.

An ID based cryptography scheme might make this more manageable. An
identity/user has a master key, and each device is issued a key where the
public-key is a human readable descriptor.

Though this comes with the added complexity of a new crypto system.
_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to