Changes To Experiment: Chainsignature
Not logged in

Changes to "Experiment: Chainsignature" between 2017-05-26 17:45:26 and 2017-05-26 18:06:58

    26     26   
    27     27   <p><br>
    28     28   </p>
    29     29   
    30     30   <p>The M_n must be included to the signature calculation x.blob to make sure
    31     31   that an eavesdropper can not reuse the signature for signing its own message.
    32     32   To make eavesdropping more difficult, different messages might be sent through
    33         -different channels.</p>
           33  +different channels.&nbsp;</p>
    34     34   
    35     35   <p><br>
    36     36   </p>
    37     37   
    38     38   <h1>Optional Bootstrapping</h1>
           39  +
           40  +<p>The message M_1 might be accompanied by M_0, which might be some bitstream
           41  +that is distributed as a small piece of paper with a QR-code. Given that NSA
           42  +and alike do not intercept paper-mail/snail-mail without specifically targeting
           43  +someone, because the cost of doing physical processing of physical letters is
           44  +too high, some initial symmetric cryptography keys and the M_0 might be sent by
           45  +using snail-mail.&nbsp;</p>
    39     46   
    40     47   <p><br>
    41     48   </p>
    42     49   
    43     50   <p><br>
    44     51   </p>