I don't understand what makes this better than getting people to use
existing encryption tools on messages that they insert under KSKs a-la
the current system.  Sure, people could request the data, but they
wouldn't be able to decipher it so it wouldn't matter.

Ian.

On Sat, Oct 06, 2001 at 11:59:15AM +1200, David McNab wrote:
> I know this has popped up at different times, but I'd like to put it forward for 
>discussion again.
> 
> There's a lot of value to be gained in a new keytype, a kind of 'reverse SSK'.
> Perhaps call this keytype 'PAK' - Privately Accessible Key.
> 
> In other words:
> 
> 1) Generate a public/private keypair
> 2) Trivial to convert the private key into a public key, but no way to convert 
>public to private except by brute force against extreme orders of execution.
> 3) Insert under the pubkey - easy.
> 4) Requests using the pubkey fail - no data found
> 5) Requests using the privkey succeed - plain data comes back
> 
> I still know stuff-all about the node internals, but I could envisage anything 
>inserted under the pubkey being stored, heavily encrypted, under a CHK. The PAK could 
>be an SSK variant. PAK@pubkey physically contains a redirect to this CHK.
> 
> Upon request, the node converts PVK@privkey to PAK@pubkey to retrieve the key, then 
>the privkey is used to decrypt the data.
> 
> Uses?
> Secure email.
> Secure payments.
> And many more.
> 
> Thoughts anyone?
> 
> David
> 

PGP signature

Reply via email to