I glanced through the paper, and noted that the security it provides only offers integrity by default, supports authenticity (though the public key signature component was a bit hazy), and doesn’t provide confidentiality. The signature algorithm wasn’t specified, and it isn’t immediately obvious how one selects a public key. Anyone take a more in-depth look at it?
The link to the paper on this website was weird for me. Here is another link to the paper, in case that one is paywalled for you too.
I glanced through the paper, and noted that the security it provides only offers integrity by default, supports authenticity (though the public key signature component was a bit hazy), and doesn’t provide confidentiality. The signature algorithm wasn’t specified, and it isn’t immediately obvious how one selects a public key. Anyone take a more in-depth look at it?