[145490] in cryptography@c2.net mail archive
Re: A mighty fortress is our PKI, Part II
daemon@ATHENA.MIT.EDU (Sampo Syreeni)
Wed Jul 28 23:16:08 2010
Date: Thu, 29 Jul 2010 03:25:40 +0300 (EEST)
From: Sampo Syreeni <decoy@iki.fi>
To: Jerry Leichter <leichter@lrw.com>
cc: Ben Laurie <ben@links.org>, Peter Gutmann <pgut001@cs.auckland.ac.nz>,
cryptography@metzdowd.com
In-Reply-To: <C6D827E3-F562-40FD-8E8F-0FD0DF632E14@lrw.com>
X-SA-Exim-Mail-From: decoy@iki.fi
On 2010-07-28, Jerry Leichter wrote:
> There is, of course, the problem of knowing when a signature was
> stolen!
Or in economic terms, asymmetric information. Can we for example learn
something from the way insurers and the like who've been dealing with
that for centuries solve the problem? And then apply it to
protocol/market design?
--
Sampo Syreeni, aka decoy - decoy@iki.fi, http://decoy.iki.fi/front
+358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com