[Cryptography] Implementations, attacks on DHTs, Mix Nets?
Jonathan Thornburg
jthorn at astro.indiana.edu
Tue Aug 27 21:47:04 EDT 2013
On Tue, 27 Aug 2013, Perry E. Metzger wrote:
> Say that you want to distribute a database table consisting of human
> readable IDs, cryptographic keys and network endpoints for some
> reason. Say you want it to scale to hundreds of millions of users.
This sounds remarkably like a description of DNSSEC.
Assuming it were widely deployed, would DNSSEC-for-key-distribution
be a reasonable way to store
email_address --> public_key
mappings?
--
-- "Jonathan Thornburg <jthorn at astro.indiana.edu>
Dept of Astronomy & IUCSS, Indiana University, Bloomington, Indiana, USA
"There was of course no way of knowing whether you were being watched
at any given moment. How often, or on what system, the Thought Police
plugged in on any individual wire was guesswork. It was even conceivable
that they watched everybody all the time." -- George Orwell, "1984"
More information about the cryptography
mailing list