Securely generating and destroying keys on a regular basis is a massive pain.
These types of protocols are more conducive to hot wallets / hsm backed infrastructure. It's really not conducive to using in conjunction with cold storage.
Have you seen the people who actually manage HSMs in the real world?
Please Login to reply.
No replies yet.