Cryptographic Data Structures(blog.bren2010.io) |
Cryptographic Data Structures(blog.bren2010.io) |
Or is the use case similar to why you would want to zero out the memory used to store password strings?
Typical example: Certificate authorities distribute CRLs primarily through untrusted channels and third parties to lower their operating cost. The CRLs are signed so its a win-win for everybody.