Concepts Specifications API Downloads
AnalysisKey management

Key management draft

Condensation is based on fully distributed key management with ephemeral keys.

To start using Condensation, a peer (user or service) generates a key pair on its device. The public key is serialized and submitted to the peer's Condensation stores, while the private key is stored on the device.

If the peer owns multipled devices, this procedure is repeated on each device.

Each device then announces the list of all public keys and accounts on its public card. The device's own public key is usually at the top of this list:

D1 D2 D1 D2 D2 D1 Public cards Devices

Adding a new device

To add a device, a new key pair is generated on the new device, and added to all public cards of the peer.

D1 D2 D3 D1 D2 D2 D1 D3 D2 D1 D3 D1 D2 D3 D1 D2 D2 D1 D3 D2 D1 D3 +

Note that the public cards are not consistent at all times. Since only the most recent card is used, this is not a problem.

Removing a device

To remove a device, its key is is removed from all public cards, and its private key is destroyed.

D2 D3 D1 D2 D2 D1 D3 D2 D1 D3 D1 D2 D3 D3 D2 D2 D3 D3 (D1) D2 D3

The old public card is left in place for some time, so that any key discovery starting with this account is redirected to the new set of devices.

A key is considered revoked if it does not appear on the latest public card of a peer any more.

Key discovery

To discover the public keys of a peer, it is necessary to know at least one account (store and hash) of the peer. One then reads all public cards, picks the newest one, and extracts the new account list from there. This is repeated until no newer public card is found:

D1 D1 D2 D2 D3 D3

The keys on the most recent card are the current keys of the peer.

Note that the initial account (or key) may not be part of the final list.

Key rotation

Since private keys only live as long as the device is part of a peer, they are inherently ephemeral. Hence, Condensation is forward-secret to the frequency at which devices are replaced.

To increase this frequency, keys can be rotated. A device thereby generates a new key pair, adds this new key to the peer, and subsequently removes the old key.

D2* D3 D3 D2 D2* D3 D2 D2* D3 D2* D3 D3 D2* D2* D3 D2 D2* D3

Key theft

If a device is stolen or compromised, it may not be possible to destroy its private key. Despite removing the device from the peer, the thief may read old versions of the private data, and modify the public card. The peer is thus separated into two different peers:

D1 D2 D3 D3 D2 D2 D3 D1

An outsider (e.g., a friend) is not able to tell which of the two peers belongs to you. (The thief could also have stolen devices D2 and D3.) Is is therefore necessary to inform friends through a different channel to reestablish full trust.

In practice, there are a number of ways to prevent or resolve such a situation:

Backups

Private keys never leave the device, and are not backed up. In fact, a lost private key is not critical, as long as the data itself has been backed up properly.