From 1ed977d1e72b0adb22544426066ce569d5a32aef Mon Sep 17 00:00:00 2001 From: Dr Washington Sanchez Date: Sat, 19 Apr 2014 12:02:16 +1000 Subject: [PATCH] Create 14-Other-Advanced-Crypto-Applications.md Chapter 14 unformatted --- .../14-Other-Advanced-Crypto-Applications.md | 289 ++++++++++++++++++ 1 file changed, 289 insertions(+) create mode 100644 14-Other-Advanced-Crypto-Applications/14-Other-Advanced-Crypto-Applications.md diff --git a/14-Other-Advanced-Crypto-Applications/14-Other-Advanced-Crypto-Applications.md b/14-Other-Advanced-Crypto-Applications/14-Other-Advanced-Crypto-Applications.md new file mode 100644 index 0000000..b172058 --- /dev/null +++ b/14-Other-Advanced-Crypto-Applications/14-Other-Advanced-Crypto-Applications.md @@ -0,0 +1,289 @@ +14. Other Advanced Crypto Applications + + 14.1. copyright + THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666, + 1994-09-10, Copyright Timothy C. May. All rights reserved. + See the detailed disclaimer. Use short sections under "fair + use" provisions, with appropriate credit, but don't put your + name on my words. + + 14.2. SUMMARY: Other Advanced Crypto Applications + 14.2.1. Main Points + 14.2.2. Connections to Other Sections + 14.2.3. Where to Find Additional Information + - see the various "Crypto" Proceedings for various papers on + topics that may come to be important + 14.2.4. Miscellaneous Comments + + 14.3. Digital Timestamping + 14.3.1. digital timestamping + - The canonical reference for digital timestamping is the + work of Stu Haber and Scott Stornetta, of Bellcore. Papers + presented at various Crypto conferences. Their work + involves having the user compute a hash of the document he + wishes to be stamped and sending the hash to them, where + they merge this hash with other hashes (and all previous + hashes, via a tree system) and then they *publish* the + resultant hash in a very public and hard-to-alter forum, + such as in an ad in the Sunday "New York Times." + + In their parlance, such an ad is a "widely witnessed + event," and attempts to alter all or even many copies of + the newspaper would be very difficult and expensive. (In a + sense, this WWE is similar to the "beacon" term Eric Hughes + used.) + + Haber and Stornetta plan some sort of commercial operation + to do this. + + This service has not yet been tested in court, so far as I + know. The MIT server is an experiment, and is probably + useful for experimenting. But it is undoubtedly even less + legally significant, of course. + 14.3.2. my summary + + 14.4. Voting + 14.4.1. fraud, is-a-person, forging identies, increased "number" + trends + 14.4.2. costs also high + 14.4.3. Chaum + 14.4.4. voting isomorphic to digital money + - where account transfers are the thing being voted on, and + the "eligible voters" are oneself...unless this sort of + thing is outlawed, which would create other problems, then + this makes a form of anonymous transfer possible (more or + less) + + 14.5. Timed-Release Crypto + 14.5.1. "Can anything like a "cryptographic time capsule" be built?" + - This would be useful for sealing diaries and records in + such a way that no legal bodies could gain access, that + even the creator/encryptor would be unable to decrypt the + records. Call it "time escrow." Ironically, a much more + correct use of the term "escrow" than we saw with the + government's various "key escrow" schemes. + - Making records undecryptable is easy: just use a one-way + function and the records are unreachable forever. The trick + is to have a way to get them back at some future time. + + Approaches: + + Legal Repository. A lawyer or set of lawyers has the key + or keys and is instructed to release them at some future + time. (The key-holding agents need not be lawyers, of + course, though that is the way things are now done. + - The legal system is a time-honored way of protecting + secrets of various kinds, and any system based on + cryptography needs to compete strongly with this simple + to use, well-established system. + - If the lawyer's identity is known, he can be + subpoenaed. Depends on jurisdictional issues, future + political climate, etc. + - But identity-hiding protocols can be used, so that the + lawyer cannot be reached. All that is know, for + example, is that "somewhere out there" is an agent who + is holding the key(s). Reputation-based systems should + work well here: the agent gains little and loses a lot + by releasing a key early, hence has no economic + motivation to do so. (Picture also a lot of "pinging" + going to "rate" the various ti