[Paul F. Doyle] Timestamping

Perry E. Metzger perry at piermont.com
Wed Sep 30 10:09:18 EDT 2009


Forwarded message:

From: "Paul F. Doyle" <paul at proofspace.com>
To: <perry at piermont.com>,
	<neuhaus at st.cs.uni-sb.de>
Cc: <dan at geer.org>
Subject: Re: [Barker, Elaine B.] NIST Publication Announcements
Date: Wed, 30 Sep 2009 09:55:36 -0400

Hello Perry and Stephan (cc: Dan Geer),

Dan Geer forwarded a message thread from the crypto mailing list.

There is an approach to Trusted Time Stamping you may find interesting,
useful and rather different given the circumstances you've described in the
thread.  It is known as the Transient Key Method and is NOT based on a
conventional PKI method for generating cryptographic time stamps, but
instead a fully distributed, web-style, self-validating model.

I would be happy to describe the Transient Key Method in detail if this
would be helpful and can forward along some background documentation if you
are interested.  BTW, it is one of the methods included in the American
National Standard X9.95.

Please let me know how I can be of assistance.

Thanks,
--Paul

"A life without integrity is meaningless...
...a record or dataset without integrity is worthless!"

Paul F. Doyle
Founder & CEO
Proofspace
P.O. Box 369
Ada, MI  49301
v. 616-458-5733
m. 616-292-8350
f. 866-685-2386/616-458-2271
www.proofspace.com
LinkedIn: www.linkedin.com/in/paulfdoyle
e. paul at proofspace.com
skype. paul_proofspace

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list