[Cryptography] Proposal of a fair contract signing protocol
Dennis E. Hamilton
dennis.hamilton at acm.org
Mon Jun 27 13:16:41 EDT 2016
> -----Original Message-----
> From: cryptography [mailto:cryptography-
> bounces+dennis.hamilton=acm.org at metzdowd.com] On Behalf Of mok-kong shen
> Sent: Sunday, June 26, 2016 14:50
> To: cryptography at metzdowd.com
> Subject: Re: [Cryptography] Proposal of a fair contract signing protocol
> Am 25.06.2016 um 23:32 schrieb Dennis E. Hamilton:
[ ... ]
> > Now the question is, who does she communicate having done that to --
> > how is it witnessed or verifiable -- and until she has, and it is not
> > repudiatable (by anyone), how did this Protocol become "fair?"
> > There have been enough descriptions of how contracts work in reality
> > under common law and also under conditions where there is something
> > significant at risk. Where the temptation of fraud is quite
> > high, brokers and escrow companies and other arrangements come into
> > the picture. Simply notaries are sufficient in some cases.
> > to do this in a digital, distributed arrangement is where the whole
> > business of non-repudiatable/-falsifiable time-stamping crops up.
> > It almost doesn't matter what the C = X || Y piecewise multi-stage
> > protocol is until the context and the above questions are addressed.
> > A different definition of fairness is simply a misdirection against
> > the general concern of how to verify that a contract has been
> > entered into and that the agreement is neither refutable nor
> > falsifiable.
> Are you questioning the validity of digital signature? This is
> however orthogonal to the present issue. In Germany, for example,
> a digital signature can have a value equivalent to a hand-written
> signature, if certain specifications stated in the law are satisfied.
Of course not. The issue is not whether a digital signature is verifiable
and not refutable. The issue is what does the signature provide an
attestation to and who holds the signed artifact as evidence of all that.
And remember, all these machinations are only relevant in the case of
non-performance, falsification, or fraud on someone's part, whether
suspected, alleged or demonstrable. The complete use case matters,
not complexification of primitives.
> M. K. Shen
> The cryptography mailing list
> cryptography at metzdowd.com
More information about the cryptography