From: Kristian Gj�steen on 3 Apr 2010 10:14 Greg Rose <ggr(a)nope.ucsd.edu> wrote: >[...] Now I understand what I >think you meant. :-) I think so! >But coming full circle, back to efficiency >arguments, the public key operation must always >apply to some smallish amount of data, and if you >have more data than that, you either need lots of >PK operations (ugh!) or something that looks like >a hash function, smells like a hash function, and >quacks like a hash function, no? Yep. >So, yeah, I can imagine such a signature scheme, >but I can also imagine not wanting to use it to >verify a boot image on a mobile device... It is important to let one's imagination run free, but not too free... -- Kristian Gj�steen |