Voltage - Identity Based Encryption.

Hack Hawk hh at hackhawk.net
Mon Jul 7 19:54:55 EDT 2003

So what they're saying is that your PRIVATE key is stored on a server 
somewhere on the Internet?!?!


According to the description, authentication is obtained using a directory 
or a domain.  If using a Microsoft domain for authentication is required, 
then how is it that the receiver is NOT required to obtain/purchase the 

Here's the quote.
"Krishnamurthy said only the sender of an encrypted e-mail needs to have 
the company's software. The recipient can then automatically decode the 
message while using Outlook, Outlook Express, Eudora, or even a BlackBerry 

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com

More information about the cryptography mailing list