[145490] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A mighty fortress is our PKI, Part II

daemon@ATHENA.MIT.EDU (Sampo Syreeni)
Wed Jul 28 23:16:08 2010

Date: Thu, 29 Jul 2010 03:25:40 +0300 (EEST)
From: Sampo Syreeni <decoy@iki.fi>
To: Jerry Leichter <leichter@lrw.com>
cc: Ben Laurie <ben@links.org>, Peter Gutmann <pgut001@cs.auckland.ac.nz>, 
    cryptography@metzdowd.com
In-Reply-To: <C6D827E3-F562-40FD-8E8F-0FD0DF632E14@lrw.com>
X-SA-Exim-Mail-From: decoy@iki.fi

On 2010-07-28, Jerry Leichter wrote:

> There is, of course, the problem of knowing when a signature was 
> stolen!

Or in economic terms, asymmetric information. Can we for example learn 
something from the way insurers and the like who've been dealing with 
that for centuries solve the problem? And then apply it to 
protocol/market design?
-- 
Sampo Syreeni, aka decoy - decoy@iki.fi, http://decoy.iki.fi/front
+358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post