W3C home > Mailing lists > Public > public-webcrypto@w3.org > June 2012

Re: Use case classification, and associated security models

From: Philip Gladstone <pgladsto@cisco.com>
Date: Wed, 13 Jun 2012 11:10:40 -0400
Message-ID: <4FD8AD70.5080706@cisco.com>
To: public-webcrypto@w3.org


On 6/13/2012 10:00 AM, Vijay Bharadwaj wrote:
>
> Yes, this (i.e. isolated decryption output) seems a little bit out of 
> scope.
>
I wonder if it would be possible to have isolated decryption by 
leveraging a new 'origin' for the decrypted output. Obviously this would 
limit the sort of operation that you could do with it but it might be 
able to solve the 'decrypt the bank statement' use case.

Philip

-- 
Philip Gladstone
Distinguished Engineer
Product Development
pgladstone@cisco.com
Phone: +1 978-ZEN-TOAD (+1 978 936 8623)
Google: +1 978 800 1010
Ham radio: N1DQ
Received on Wednesday, 13 June 2012 15:11:12 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Wednesday, 13 June 2012 15:11:13 GMT