At 10:30 AM 2/27/2008, Harsh Kupwade wrote:
>Forcing a signer to send a certificate is fine, but if the signer's 
>root CA is not same as the receiver's root CAs, then the receiver 
>has to go through a complex path construction process which is not a 
>trivial problem.

I think this was what I was asking about... and it appears as if it 
might be a hindrance

><?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" />
>Diana Berbecaru, Antonio Lioy and Marius Marian "On the Complexity 
>of Public-Key Certificate Validation"
>
><http://www.springerlink.com/content/1c77by87fcm34pp9/>http://www.springerlink.com/content/1c77by87fcm34pp9/
>
>
>Eric Rescorla <[EMAIL PROTECTED]> wrote:
>At Wed, 27 Feb 2008 10:02:21 -0600,
>James M. Polk wrote:
> >
> > At 11:41 PM 2/26/2008, Eric Rescorla wrote:
> > > > I must say I didn't understand how revocation works. From the
> > > > description of the algorithm it seemed untenable. The verifier never
> > > > needs to obtain a cert and the public key is generated statically from
> > > > the identity. Once they have the private key, the sender can 
> always sign
> > > > with it, so I don't see how revocation is possible.
> > >
> > >The way this is done is with what's effectively short-lived
> > >identities (you could do the same thing with short-lived
> > >certificates) you treat the time as part of the identity.
> > >E.g., you might be "[EMAIL PROTECTED]:March-April, 2008". So,
> > >the user needs to periodically refresh his private key to match
> > >the new identity. If the key has been revoked you don't issue
> > >new keys.
> >
> > naive question
> >
> > what burden does this put on a peer (or all peers) to (conceivably)
> > have to constantly discover JDR's public key, for example (because
> > they don't know how long the private key is good for)?
> >
> > Or is this problem known/expected or solved easily already?
>
>Well, the feature of IBE schemes is that once you have the public
>parameters for the KG, you can compute the public key without
>fetching further data from the CA/KG. This is a lot more interesting
>for encryption than it is for signature, since, as I said, you
>can force the signer to just send you a new certificate, so the
>retrieval cost is minimized.
>
>-Ekr
>_______________________________________________
>Sip mailing list https://www.ietf.org/mailman/listinfo/sip
>This list is for NEW development of the core SIP Protocol
>Use [EMAIL PROTECTED] for questions on current sip
>Use [EMAIL PROTECTED] for new developments on the application of sip
>
>
>
>Be a better friend, newshound, and know-it-all with Yahoo! Mobile. 
><http://us.rd.yahoo.com/evt=51733/*http://mobile.yahoo.com/;_ylt=Ahu06i62sR8HDtDypao8Wcj9tAcJ>Try
> 
>it now.
>_______________________________________________
>Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
>This list is for NEW development of the core SIP Protocol
>Use [EMAIL PROTECTED] for questions on current sip
>Use [EMAIL PROTECTED] for new developments on the application of sip

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to