From: Kristian Gj�steen on
Greg Rose <ggr(a)nope.ucsd.edu> wrote:
>[...] Now I understand what I
>think you meant. :-)

I think so!

>But coming full circle, back to efficiency
>arguments, the public key operation must always
>apply to some smallish amount of data, and if you
>have more data than that, you either need lots of
>PK operations (ugh!) or something that looks like
>a hash function, smells like a hash function, and
>quacks like a hash function, no?

Yep.

>So, yeah, I can imagine such a signature scheme,
>but I can also imagine not wanting to use it to
>verify a boot image on a mobile device...

It is important to let one's imagination run free, but not too free...

--
Kristian Gj�steen