[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Binding cryptography - much work, little point ?
Eric_Verheul writes:
> In our scheme any third party, which is probably never a TRP, can check
> equality of the sessionkeys send to the primary recipient (the TRP) and
> the second recipient (the real adressee), i.e. *without* needing secret
So could anyone anyway by asking the TRP. The TRP returns a Yes/No
answer, withou disclosing the session key. Is your binding scheme motivated mainly
by avoiding that workload on the TRP ? Or by the fact that everybody might
prefer a different TRP ?
I suspect the scheme is incomplete anyway. After skimming the web page I
see that the aim is to show the same session key has been encrypted under
different ElGamal pubkeys. Now who's to say those pubkeys belong to anyone ?
Or is this what is meant by "such as Margaret's identity" ? You'd list the
ids of the TRPs and also prove that the pubkeys used were theirs .... ?
Now to the politics...
E__Allen_Smith writes:
> Quite simply, you've invented a system that makes censorship more
> possible. As a scientist, I try to avoid areas that have such negative
> effects
The usual Big Problems for GAK
1) What's in it for the user ?
2) What happens when the Feds recover meaningless data ?
2 does not seem to be addressed except by proposing restrictions
which Eric dismisses as follows:
Adam Back:
>system because their stated aims are untrue: they *do* want to outlaw
>non-escrowed encryption for domestic US traffic, and they *do* want to
Eric Verheul:
> Who is they, governments as a whole? If you simplify discussions in this
> way, I might as well say: "you guys only want to help criminals". I understand
> your fears, but don't exaggerate.
-- Peter Allan [email protected]