[144904] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Barker, Elaine B.] NIST Publication Announcements

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Tue Sep 29 23:00:13 2009

From: "Perry E. Metzger" <perry@piermont.com>
To: Stephan Neuhaus <neuhaus@st.cs.uni-sb.de>
Cc: cryptography@metzdowd.com
Date: Tue, 29 Sep 2009 10:31:01 -0400
In-Reply-To: <AE7D34CD-F440-430D-87A0-3AF8EA4BC80E@st.cs.uni-sb.de> (Stephan
	Neuhaus's message of "Tue, 29 Sep 2009 09:40:00 +0200")


Stephan Neuhaus <neuhaus@st.cs.uni-sb.de> writes:
> For business reasons,
> Alice can't force Bob to use a particular TTA, and it's also
> impossible to stipulate a particular TTA as part of the job
> description (the reason is that Alice and the Bobs----great band name
> BTW---won't agree to trust any particular TTA and also don't want to
> operate their own).

You don't need such a complicated description -- you're just asking "can
I do secure timestamping without requiring significant trust in the
timestamping authority."

The Haber & Stornetta scheme provides a timestamping service that
doesn't require terribly much trust, since hard to forge widely
witnessed events delimit particular sets of timestamps. The only issue
is getting sufficient granularity.

Perry

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post