> To clarify:  I think everyone and everything should be identified by 
 > their public key,...

Would re-analyzing all this in a key-centric model rather than
a name-centric model offer any insight?  (key-centric meaning
that the key is the identity and "Dan" is an attribute of that
key; name-centric meaning that Dan is the identity and the key
is an attribute of that name)

--dan

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to