Content deleted Content added
No edit summary Tag: Reverted |
|||
Line 6:
In transient-key systems, however, the keypair is assigned to a brief interval of time, not to a particular person or entity. Data signed by a specific private key becomes associated with a specific time and date. A keypair is active only for a few minutes, after which the private key is permanently destroyed. Therefore, unlike public-key systems, transient-key systems do not depend upon the long-term security of the private keys.
==Establishing data integrity with transient-key timestamps==
In a transient-key system, the source of time must be a consistent standard understood by all senders and receivers. Since a local [[system clock]] may be changed by a user, it is never used as a source of time. Instead, data is digitally signed with a time value derived from [[Universal Coordinated Time|Universal Coordinated Time (UTC)]] accurate to within a millisecond, in accordance with the [[ANSI ASC X9.95 Standard|ANSI ASC X9.95 standard for Trusted Timestamping]]. Whenever a time interval in a transient-key system expires, a new public/private keypair is generated, and the private key from the previous interval is used to digitally certify the new public key. The old private key is then destroyed. This "key-chaining" system is the immediate ancestor of the [[Blockchain]] technology in vogue today.
Line 34:
*[http://www.proofspace.com ProofSpace, Inc] has published a more detailed [http://fios.com/proofmarksystemtech.pdf technical overview document] of transient key cryptography.
== References ==
{{reflist}}
==External links==
{{Cryptography navbox | public-key}}
[[Category:Blockchains]]▼
[[Category:Data security]]▼
[[Category:Public-key cryptography]]
[[Category:Banking technology]]
▲[[Category:Data security]]
▲[[Category:Blockchains]]
|