First page Back Continue Last page Summary Graphic
12. Selected Plaintext
Get people to encrypt things you provide them, and use it to get their private key.
This was demonstrated to work in the early 1980s.
Several such systems have been proposed lately.
Notes: