[Freedombox-discuss] Fwd: [Cryptography] Mathmesh mailing list
sandyinchina at gmail.com
Tue Sep 3 14:40:19 BST 2019
>From the crypto list.
Is this something FB should consider including?
---------- Forwarded message ---------
From: Phillip Hallam-Baker <phill at hallambaker.com>
Date: Tue, Aug 13, 2019 at 9:15 PM
Subject: [Cryptography] Mathmesh mailing list
To: Cryptography Mailing List <cryptography at metzdowd.com>
The IETF has started a discussion list for the Mathematical Mesh in
preparation for a Working Group forming BOF at the Singapore meeting
We should get started on the discussions later today. People here
might want to subscribe ahead of time.
mathmesh at ietf.org
The Mesh is two separate things at this point
1) A protocol that makes it easy to manage private keys (and other
application configuration data) across a user's devices.
2) The cryptographic platform that was originally designed to support
(1) but can be used to build applications in its own right. These
A generalized fingerprint format allowing digest values, cryptographic
keys, keyshares and nonces to be represented in compact (BASE 32
Data At Rest Envelope (DARE)
A PKCS#7 type format for use with JSON signature and encryption and an
append only log format that supports BlockChain type integrity checks
and incremental encryption.
A JSON based client-side PKI. This has many of the features of SAML
and PKIX but is designed to support management of trust relationships
and keys from the point of view of the end-user.
An extension of a Personal Mesh that represent's a particular external
persona (e.g. personal, business use).
An untrusted cloud based service protocol that supports a messaging
infrastructure used to manage a personal Mesh.
The Mesh makes use of a number of key splitting and key combining
techniques that are made possible by the features of Diffie Hellman
and its EC variants.
A key innovation in the Mesh is that unlike in traditional Internet
protocols where an account is created by and belongs to a service
provider, Mesh accounts are created by Mesh users and ultimately
controlled by a private key held by the user. Thus while Alice may
begin by creating a personal account and binding it to
alice at example.com for service, she can change her mind at any time and
change her service provider to example.net.
The cryptography mailing list
cryptography at metzdowd.com
More information about the Freedombox-discuss