[146832] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Why prefer symmetric crypto over public key

daemon@ATHENA.MIT.EDU (Jerry Leichter)
Sun Sep 8 13:30:42 2013

X-Original-To: cryptography@metzdowd.com
From: Jerry Leichter <leichter@lrw.com>
In-Reply-To: <3F19A4A4-9993-4C26-951A-746E8C011599@lrw.com>
Date: Sun, 8 Sep 2013 13:08:40 -0400
To: Ray Dillinger <bear@sonic.net>
Cc: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Sep 8, 2013, at 1:06 PM, Jerry Leichter wrote:
> There was a proposal out there based on something very much like this to create tamper-evident signatures.  I forget the details - it was a couple of years ago - but the idea was that every time you sign something, you modify your key in some random way, resulting in signatures that are still verifiably yours, but also contain the new random modification.  Beyond that, I don't recall how it worked - it was quite clever... ah, here it is:  http://eprint.iacr.org/2005/147.pdf
Spoke too quickly - that paper is something else entirely.  I still can't locate the one I was thinking of.
                                                        -- Jerry


_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post