This page is not created by, affiliated with, or supported by Slack Technologies, Inc.
2018-12-10
Channels
- # 100-days-of-code (2)
- # adventofcode (188)
- # aleph (3)
- # announcements (2)
- # beginners (76)
- # boot (3)
- # braveandtrue (49)
- # cider (82)
- # clara (15)
- # clojure (101)
- # clojure-europe (4)
- # clojure-india (3)
- # clojure-italy (26)
- # clojure-kc (1)
- # clojure-nl (4)
- # clojure-norway (1)
- # clojure-russia (5)
- # clojure-uk (33)
- # clojurescript (32)
- # crypto (20)
- # cursive (34)
- # datomic (45)
- # emacs (3)
- # events (1)
- # figwheel (1)
- # figwheel-main (10)
- # fulcro (30)
- # graphql (14)
- # hoplon (12)
- # hyperfiddle (21)
- # jobs (11)
- # kaocha (7)
- # klipse (8)
- # leiningen (10)
- # luminus (3)
- # nrepl (18)
- # off-topic (232)
- # onyx (8)
- # pathom (6)
- # re-frame (30)
- # reagent (3)
- # reitit (6)
- # remote-jobs (3)
- # ring-swagger (4)
- # shadow-cljs (21)
- # spacemacs (5)
- # sql (18)
- # tools-deps (23)
- # yada (2)
because java has a bunch of elliptic curves built in https://docs.oracle.com/javase/10/docs/api/index.html?java/security/KeyPair.html
I would like to be able to generate public and private keys for users, break the private key apart with Shamir's secret sharing, and then store the shares in different places
The idea being to reassemble the private key to decrypt messages encrypted with the public key
that sounds legit. Consider not encrypting using public key encryption alone -- many systems do key wrapping (of a symmetric key)
break up the shares for recovery, but the private key is only used to decrypt a symmetric secret, and it's that secret that is used to encrypt/decrypt the data
well, I'd like to start simple and build it up. I was hoping to play around with a toy implementation in a repl, but haven't had a good time with it yet