First page Back Continue Last page Summary Graphic
12. Selected Plaintext
- Get people to encrypt things you provide them, and use it to get their private key.
- This was demonstrated to work in the early 1980s.
- Several such systems have been proposed lately.
Notes: