Content deleted Content added
rm empty section |
No edit summary |
||
Line 7:
==Establishing data integrity==
In a transient-key system, the source of time must be a consistent standard understood by all senders and receivers. Since a local [[system clock]] may be changed by a user, it is never used as a source of time. Instead, data is digitally signed with a time value derived from [[Universal Coordinated Time|Universal Coordinated Time (UTC)]] accurate to within a millisecond, in accordance with the [[ANSI ASC X9.95 Standard|ANSI ASC X9.95 standard for Trusted Timestamping]].{{citation needed|date=March 2024}} Whenever a time interval in a transient-key system expires, a new public/private keypair is generated, and the private key from the previous interval is used to digitally certify the new public key. The old private key is then destroyed. This "key-chaining" system is the immediate ancestor of the [[Blockchain]] technology in vogue today.
For the new interval, time values are obtained from a trusted third-party source, and specific moments in time can be [[interpolated]] in between received times by using a time-biasing method based on the internal system timer. If a trusted time source cannot be obtained or is not running within specified [[Engineering tolerance|tolerances]], transient private keys are not issued. In that case, the time interval chain is terminated, and a fresh one is begun. The old and new chains are connected through network archives, which enable all servers to continue to verify the [[data integrity]] through time of protected data, regardless of how often the chain must be restarted.
Line 18:
==Cross-verification==
[[Image:Cross-Certification.png|
Through independently operating servers, '''cross-certification''' can provide third-party proof of the validity of a time interval chain and irrefutable evidence of consensus on the current time. Transient-key cryptographic systems display high [[Byzantine fault tolerance]]. A web of interconnected cross-certifying servers in a distributed environment creates a widely witnessed chain of trust that is as strong as its strongest link. By contrast, entire [[Hierarchy|hierarchies]] of traditional public key systems can be compromised if a single private key is exposed.<ref>{{Cite web |title=Why Should Every Beginner Crypto Trader Use Trading Signals? |url=https://cryptochatty.com/crypto-signals.html |access-date=2023-04-27
An individual transient key interval chain can be cross-certified with other transient key chains and server instances. Through cross-certification, Server A signs Server B's interval chain, the signed data of which is the interval definition. In effect, the private keys from Server B are used to sign the public keys of Server A. In the diagram, a server instance is cross-certified with two other server instances (blue and orange). Cross-certification requires that the timestamp for the interval agree with the timestamp of the cross-certifying server within acceptable tolerances, which are user-defined and typically a few hundred milliseconds in duration.
Line 30:
During an interval, the transient private key is used to sign data concatenated with trusted timestamps and authenticity certificates. To [[File verification|verify]] the data at a later time, a receiver accesses the [[Persistence (computer science)|persistent]] public key for the appropriate time interval. The public key applied to the digital signature can be passed through published cryptographic routines to unpack the [[Cryptographic hash function|hash]] of the original data, which is then compared against a fresh hash of the stored data to verify data integrity. If the signature successfully decrypts using a particular interval's published public key, the receiver can be assured that the signature originated during that time period. If the decrypted and fresh hashes match, the receiver can be assured that the data has not been tampered with since the transient private key created the timestamp and signed the data.
Transient-key cryptography was invented in 1997 by Dr. Michael D. Doyle of Eolas Technologies Inc., while working on the [[Visible Embryo Project]]<ref>{{cite patent |country=US |number=6381696 |title=Method and system for transient key digital time stamps |gdate=2002-04-30 |inventor=MD Doyle}}</ref><ref>{{cite patent |country=US |number=7047415 |title=System and method for widely witnessed proof of time |gdate=2006-05-16 |invent1=MD Doyle |invent2=PF Doyle |invent3=GW Bernsohn |invent4=JD Roberts }}</ref><ref>{{cite patent |country=US |number= 7210035 |title=System and method for graphical indicia for the certification of records |gdate=2007-04-24 |invent1=MD Doyle |invent2=RG Hamilton |invent3=MC Perrone |invent4=PF Doyle}}</ref> and later acquired by and productized by ProofSpace, Inc. It has been adopted as a national standard in the
*[http://www.proofspace.com ProofSpace, Inc] has published a more detailed [http://fios.com/proofmarksystemtech.pdf technical overview document] of transient key cryptography.
==See also==
* [[Certificateless cryptography]]
==References==
Line 39 ⟶ 42:
{{Cryptography navbox|public-key}}
[[Category:Blockchains]]▼
[[Category:Public-key cryptography]]
[[Category:Banking technology]]
[[Category:Data security]]
▲[[Category:Blockchains]]
|