[146425] in cryptography@c2.net mail archive
Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?
daemon@ATHENA.MIT.EDU (Peter Saint-Andre)
Tue Aug 27 22:20:23 2013
X-Original-To: cryptography@metzdowd.com
Date: Tue, 27 Aug 2013 19:57:30 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
To: Jonathan Thornburg <jthorn@astro.indiana.edu>
In-Reply-To: <alpine.BSO.2.00.1308272145240.19706@cobalt.astro.indiana.edu>
Cc: Cryptography List <cryptography@metzdowd.com>,
"Perry E. Metzger" <perry@piermont.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On 8/27/13 7:47 PM, Jonathan Thornburg wrote:
> On Tue, 27 Aug 2013, Perry E. Metzger wrote:
>> Say that you want to distribute a database table consisting of human
>> readable IDs, cryptographic keys and network endpoints for some
>> reason. Say you want it to scale to hundreds of millions of users.
>
> This sounds remarkably like a description of DNSSEC.
>
> Assuming it were widely deployed, would DNSSEC-for-key-distribution
> be a reasonable way to store
> email_address --> public_key
> mappings?
You mean something like this (email address --> OTR key)?
https://datatracker.ietf.org/doc/draft-wouters-dane-otrfp/
Peter
--
Peter Saint-Andre
https://stpeter.im/
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography