Content deleted Content added
Count Count (talk | contribs) →External links: rm spam links |
|||
(One intermediate revision by one other user not shown) | |||
Line 2:
==Public-key vs. transient-key==
Both [[
In transient-key systems, however, the keypair is assigned to a brief interval of time, not to a particular person or entity. Data signed by a specific private key becomes associated with a specific time and date. A keypair is active only for a few minutes, after which the private key is permanently destroyed. Therefore, unlike public-key systems, transient-key systems do not depend upon the long-term security of the private keys.
Line 18:
==Cross-verification==
[[Image:Cross-Certification.png|thumb|right|320px|A private key is cross-certified using two other transient-key servers.]]
Through independently operating servers, '''cross-certification''' can provide third-party proof of the validity of a time interval chain and irrefutable evidence of consensus on the current time. Transient-key cryptographic systems display high [[Byzantine fault tolerance]]. A web of interconnected cross-certifying servers in a distributed environment creates a widely witnessed chain of trust that is as strong as its strongest link. By contrast, entire [[Hierarchy|hierarchies]] of traditional public key systems can be compromised if a single private key is exposed.
Line 25:
==Network archives==
Along with intervals, cross-certifications are stored in a network archive. Within a transient-key network, the [[archive]] is a logical [[database]] that can be stored and replicated on any system to enable verification of data that has been timestamped and signed by transient keys. A map of the set of accessible archives is stored within every digital signature created in the system. Whenever cross-certifications are completed at the beginning of an interval, the archive map is updated and published to all servers in the network.{{cn|date=April 2025}}
==Verification==
Line 34:
==See also==
* [[Certificateless cryptography]]
* [[Certificate-based encryption]]
==References==
Line 41 ⟶ 42:
[[Category:Blockchains]]
[[Category:Public-key cryptography]]▼
[[Category:Banking technology]]
▲[[Category:Public-key cryptography]]
[[Category:Data security]]
|