On 30/12/2014 9:34 am, "Trevor Perrin" <[email protected]> wrote: > (3) All devices have device-specific decryption-involved keys, and a > master device uses a signing key to authorize subordinate devices.
An ID based cryptography scheme might make this more manageable. An identity/user has a master key, and each device is issued a key where the public-key is a human readable descriptor. Though this comes with the added complexity of a new crypto system.
_______________________________________________ Messaging mailing list [email protected] https://moderncrypto.org/mailman/listinfo/messaging
