[144916] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Barker, Elaine B.] NIST Publication Announcements

daemon@ATHENA.MIT.EDU (Stephan Neuhaus)
Fri Oct 2 13:25:24 2009

Cc: Peter Gutmann <pgut001@cs.auckland.ac.nz>,
 cryptography@metzdowd.com
From: Stephan Neuhaus <neuhaus@st.cs.uni-sb.de>
To: "Perry E. Metzger" <perry@piermont.com>
In-Reply-To: <87vdizjhog.fsf@snark.cb.piermont.com>
Date: Thu, 1 Oct 2009 17:07:46 +0200


On Oct 1, 2009, at 16:46, Perry E. Metzger wrote:

> It is also completely impossible to prove you've deleted a
> record. Someone who can read the record can always make a copy of
> it. Cryptography can't fix the DRM problem.

Sorry, I should have clarified that. We don't want to verify that Bob  
has in fact deleted the patient record, we just want to verify whether  
Bob *claims* to have deleted the patient record *within the time span  
given*. If Alice later finds out that Bob has lied, she will have this  
signed claim, with which she can take him to court.

Best,

Stephan

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post