On Tue 2015-07-21 23:36:45 +0200, ved...@nym.hush.com wrote:
> There could be a workaround, where the key is uploaded to the keyservers,
> but functionally unusable except to individuals whom the key-creator wants to 
> use it:
>
> [1] Encrypt part of the public key symmetrically, the same way that the 
> private key is symmetrically encrypted.
>
> [2] Send the passphrase to whomever you want to send the public key, 
> encrypted to their public key.
>
> [3] Upload the key to keyservers.  It will be usable only by those whom you 
> choose to give the passphrase.
>
> (* Unless*  you misjudged someone to whom you sent the passphrase, and he 
> turns maliciously on you, and uploads the decrypted form .... )
>
> If such a key-type were implemented, would it need a change in 4880, other 
> than a notice to allow it?

if we were to have a cryptographically-validating keyserver, there's no
way that the certificate could be verified.

I'm not clear what the use case for this is. people who "want their
public key to be not-public" probably actually care more about:

 * avoiding publication of their User ID, and

 * avoiding publication of a persistent identifier that can link
   communications together

both of these things would probably fail if the key (even obscured) was
published to the public key servers.

I don't see how this proposal solves the identified concern (though it's
possible that i'm misunderstanding the identified concern).

  --dkg

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to