|
|
|
@ -90,9 +90,10 @@ potential leaks or theft.
|
|
|
|
|
|
|
|
|
|
## Approach
|
|
|
|
|
|
|
|
|
|
Synchronizing private keys among devices of the same user in a secure
|
|
|
|
|
manner by using Trustwords (cf. {{I-D.birk-pep-trustwords}}) between any
|
|
|
|
|
two devices to pair them before starting the exchange of the private keys.
|
|
|
|
|
The basic approach is to synchronize private keys among devices of the same
|
|
|
|
|
user in a secure manner by using Trustwords (cf. {{I-D.birk-pep-trustwords}})
|
|
|
|
|
confirmation between any two devices (at a time) for pairing them -- before
|
|
|
|
|
starting the security-sensitive transfer of the private key material.
|
|
|
|
|
|
|
|
|
|
## Main Challenge
|
|
|
|
|
|
|
|
|
|