Search a distributed database, "the internet", for revocation of a particular public key. A single point of failure, e.g., a central repository of revocations, would be bad, as an adversary who has compromised a key would like to keep other people continuing to use it.
No comments :
Post a Comment