<p dir="ltr">On 30/12/2014 9:34 am, "Trevor Perrin" <<a href="mailto:trevp@trevp.net">trevp@trevp.net</a>> wrote:<br>
> (3) All devices have device-specific decryption-involved keys, and a<br>
> master device uses a signing key to authorize subordinate devices.</p>
<p dir="ltr">An ID based cryptography scheme might make this more manageable. An identity/user has a master key, and each device is issued a key where the public-key is a human readable descriptor.</p>
<p dir="ltr">Though this comes with the added complexity of a new crypto system.</p>