Anda di halaman 1dari 12

A CYPHERPUNK'S MANIFESTO

Eric Hughes
March 9, 1993

Privacy is necessary for an open society in the elec- the primary such system. An anonymous transaction
tronic age. Privacy is not secrecy. A private matter is system is not a secret transaction system. An anony-
something one doesn't want the whole world to mous system empowers individuals to reveal their
know, but a secret matter is something one doesn't identity when desired and only when desired; this is
want anybody to know. Privacy is the power to se- the essence of privacy.
lectively reveal oneself to the world.
Privacy in an open society also requires cryptog-
If two parties have some sort of dealings, then each raphy. If I say something, I want it heard only by
has a memory of their interaction. Each party can those for whom I intend it. If the content of my
speak about their own memory of this; how could speech is available to the world, I have no privacy. To
anyone prevent it? One could pass laws against it, encrypt is to indicate the desire for privacy, and to
but the freedom of speech, even more than privacy, encrypt with weak cryptography is to indicate not
is fundamental to an open society; we seek not to too much desire for privacy. Furthermore, to reveal
restrict any speech at all. If many parties speak to- one's identity with assurance when the default is an-
gether in the same forum, each can speak to all the onymity requires the cryptographic signature.
others and aggregate together knowledge about in-
dividuals and other parties. The power of electronic We cannot expect governments, corporations, or
communications has enabled such group speech, other large, faceless organizations to grant us pri-
and it will not go away merely because we might vacy out of their beneficence. It is to their advantage
want it to. to speak of us, and we should expect that they will
speak. To try to prevent their speech is to fight
Since we desire privacy, we must ensure that each against the realities of information. Information does
party to a transaction have knowledge only of that not just want to be free, it longs to be free. Infor-
which is directly necessary for that transaction. Since mation expands to fill the available storage space.
any information can be spoken of, we must ensure Information is Rumor's younger, stronger cousin; In-
that we reveal as little as possible. In most cases per- formation is fleeter of foot, has more eyes, knows
sonal identity is not salient. When I purchase a mag- more, and understands less than Rumor.
azine at a store and hand cash to the clerk, there is
no need to know who I am. When I ask my electronic We must defend our own privacy if we expect to
mail provider to send and receive messages, my pro- have any. We must come together and create sys-
vider need not know to whom I am speaking or what tems which allow anonymous transactions to take
I am saying or what others are saying to me; my pro- place. People have been defending their own privacy
vider only need know how to get the message there for centuries with whispers, darkness, envelopes,
and how much I owe them in fees. When my identity closed doors, secret handshakes, and couriers. The
is revealed by the underlying mechanism of the technologies of the past did not allow for strong pri-
transaction, I have no privacy. I cannot here selec- vacy, but electronic technologies do.
tively reveal myself; I must _always_ reveal myself.
We the Cypherpunks are dedicated to building
Therefore, privacy in an open society requires anon- anonymous systems. We are defending our privacy
ymous transaction systems. Until now, cash has been with cryptography, with anonymous mail forwarding
systems, with digital signatures, and with electronic the whole globe, and with it the anonymous trans-
money. actions systems that it makes possible.

Cypherpunks write code. We know that someone has For privacy to be widespread it must be part of a so-
to write software to defend privacy, and since we cial contract. People must come and together deploy
can't get privacy unless we all do, we're going to these systems for the common good. Privacy only
write it. We publish our code so that our fellow Cy- extends so far as the cooperation of one's fellows in
pherpunks may practice and play with it. Our code is society. We the Cypherpunks seek your questions
free for all to use, worldwide. We don't much care if and your concerns and hope we may engage you so
you don't approve of the software we write. We that we do not deceive ourselves. We will not, how-
know that software can't be destroyed and that a ever, be moved out of our course because some may
widely dispersed system can't be shut down. disagree with our goals.

Cypherpunks deplore regulations on cryptography, The Cypherpunks are actively engaged in making the
for encryption is fundamentally a private act. The act networks safer for privacy. Let us proceed together
of encryption, in fact, removes information from the apace.
public realm. Even laws against cryptography reach
only so far as a nation's border and the arm of its Onward.
violence. Cryptography will ineluctably spread over
Crypto Glossary
Timothy C. May and Eric Hughes
November 22, 1992

From: tcmay@netcom.com (Timothy C. May)


Subject: Crypto Glossary
Date: Sun, 22 Nov 92 11:50:55 PST

Here's the glossary of crypto terms we passed out I'm not going to be maintaining the "Cypherpunks
in printed form at the first Cypherpunks meeting in FAQ," so don't send me corrections or additions.
September 1992. Some compromises had to be
made in going from the printed form to the ASCII Enjoy
of this transmission, so I hope you'll bear with me.
Tim May
I'm sending it to the entire list because nearly eve-
ryone who hears about it says "Is it online?" and
wants a copy. If you don't want it, discard it.

Major Branches of Cryptology (as we see it)


(these sections will introduce the terms in context, though complete definitions will not be given)

Encryption Cryptographic Voting


privacy of messages focus: ballot box anonymity
using ciphers and codes to protect the se- credentials for voting
crecy of messages issues of double voting, security, robustness,
DES is the most common symmetric cipher efficiency
(same key for encryption and decryption)
RSA is the most common asymmetric cipher Digital Cash
(different keys for encryption and decryp- focus: privacy in transactions, purchases
tion) unlinkable credentials
blinded notes
Signatures and Authentication "digital coins" may not be possible
proving who you are
proving you signed a document (and not Crypto Anarchy
someone else) using the above to evade government, to
bypass tax collection, etc.
Untraceable Mail a technological solution to the problem of
untraceable sending and receiving of mail too much government
and messages
focus: defeating eavesdroppers and traffic
analysis
DC protocol (dining cryptographers)
Glossary
agoric systems always a cooperative protocol and the re-
open, free market systems in which volun- ceiver of the signature provides the signer
tary transactions are central. with the blinding information.

Alice and Bob blob


cryptographic protocols are often made the crypto equivalent of a locked box. A
clearer by considering parties A and B, or cryptographic primitive for bit commitment,
Alice and Bob, performing some protocol. with the properties that a blobs can repre-
Eve the eavesdropper, Paul the prover, and sent a 0 or a 1, that others cannot tell be
Vic the verifier are other common stand-in looking whether itUs a 0 or a 1, that the cre-
names. ator of the blob can "open" the blob to re-
veal the contents, and that no blob can be
ANDOS both a 1 and a 0. An example of this is a
all or nothing disclosure of secrets. flipped coin covered by a hand.

anonymous credential channel


a credential which asserts some right or the path over which messages are transmit-
privilege or fact without revealing the iden- ted. Channels may be secure or insecure,
tity of the holder. This is unlike CA driver's and may have eavesdroppers (or enemies,
licenses. or disrupters, etc.) who alter messages, in-
sert and delete messages, etc. Cryptography
asymmetric cipher is the means by which communications over
same as public key cryptosystem. insecure channels are protected.

authentication chosen plaintext attack


the process of verifying an identity or cre- an attack where the cryptanalyst gets to
dential, to ensure you are who you said you choose the plaintext to be enciphered, e.g.,
were. when possession of an enciphering machine
or algorithm is in the possession of the
biometric security cryptanalyst.
a type of authentication using fingerprints,
retinal scans, palm prints, or other physi- cipher
cal/biological signatures of an individual. a secret form of writing, using substitution
or transposition of characters or symbols.
bit commitment
e.g., tossing a coin and then committing to ciphertext
the value without being able to change the the plaintext after it has been encrypted.
outcome. The blob is a cryptographic primi-
tive for this. code
a restricted cryptosystem where words or
blinding, blinded signatures letters of a message are replaced by other
A signature that the signer does not re- words chosen from a codebook. Not part of
member having made. A blind signature is modern cryptology, but still useful.

coin flipping
an important crypto primitive, or protocol, mail, digital pseudonyms, cryptographic
in which the equivalent of flipping a fair coin voting, and digital cash. A pun on "crypto,"
is possible. Implemented with blobs. meaning "hipen," and as when Gore Vidal
called William F. Buckley a "crypto fascist."
collusion
wherein several participants cooperate to cryptography
deduce the identity of a sender or receiver, another name for cryptology.
or to break a cipher. Most cryptosystems are
sensitive to some forms of collusion. Much cryptology
of the work on implementing DC Nets, for the science and study of writing, sending,
example, involves ensuring that colluders receiving, and deciphering secret messages.
cannot isolate message senders and thereby Includes authentication, digital signatures,
trace origins and destinations of mail. the hiding of messages (steganography),
cryptanalysis, and several other fields.
computationally secure
where a cipher cannot be broken with avail- cyberspace
able computer resources, but in theory can the electronic domain, the Nets, and com-
be broken with enough computer resources. puter-generated spaces. Some say it is the
Contrast with unconditionally secure. "consensual reality" described in "Neuro-
mancer." Others say it is the phone system.
countermeasure Others have work to do.
something you do to thwart an attacker.
DC protocol, or DC-Net
credential the dining cryptographers protocol. DC-
facts or assertions about some entity. For Nets use multiple participants communi-
example, credit ratings, passports, reputa- cating with the DC protocol.
tions, tax status, insurance records, etc. Un-
der the current system, these credentials are DES
increasingly being cross-linked. Blind signa- the Data Encryption Standard, proposed in
tures may be used to create anonymous 1977 by the National Bureau of Standards
credentials. (now NIST), with assistance from the Na-
tional Security Agency. Based on the "Luci-
credential clearinghouse fer" cipher developed by Horst Feistel at
banks, credit agencies, insurance compa- IBM, DES is a secret key cryptosystem that
nies, police departments, etc., that correlate cycles 64-bit blocks of data through multi-
records and decide the status of records. ple permutations with a 56-bit key control-
ling the routing. "Diffusion" and "confusion"
cryptanalysis are combined to form a cipher that has not
methods for attacking and breaking ciphers yet been cryptanalyzed (see "DES, Security
and related cryptographic systems. Ciphers of"). DES is in use for interbank transfers, as
may be broken, traffic may be analyzed, and a cipher inside of several RSA-based sys-
passwords may be cracked. Computers are tems, and is available for PCs.
of course essential.
DES, Security of
crypto anarchy many have speculated that the NSA placed
the economic and political system after the a trapdoor (or back door) in DES to allow it
deployment of encryption, untraceable e- to read DES-encrypted messages. This has
not been proved. It is known that the origi- Analogous to a written signature on a docu-
nal Lucifer algorithm used a 128-bit key and ment. A modification to a message that only
that this key length was shortened to 64 bits the signer can make but that everyone can
(56 bits plus 8 parity bits), thus making ex- recognize. Can be used legally to contract at
haustive search much easier (so far as is a distance.
known, brute-force search has not been
done, though it should be feasible today). digital timestamping
Shamir and Bihan have used a technique one function of a digital notary public, in
called "differential cryptanalysis" to reduce which some message (a song, screenplay,
the exhaustive search needed for chosen lab notebook, contract, etc.) is stamped with
plaintext attacks (but with no import for or- a time that cannot (easily) be forged.
dinary DES).
dining cryptographers protocol (aka DC proto-
differential cryptanalysis the Shamir-Biham col, DC nets)
technique for cryptanalyzing DES. With a the untraceable message sending system in-
chosen plaintext attack, they've reduced the vented by David Chaum. Named after the
number of DES keys that must be tried from "dining philosophers" problem in computer
about 2^56 to about 2^47 or less. Note, science, participants form circuits and pass
however, that rarely can an attacker mount messages in such a way that the origin can-
a chosen plaintext attack on DES systems. not be deduced, barring collusion. At the
simplest level, two participants share a key
digital cash, digital money between them. One of them sends some ac-
Protocols for transferring value, monetary or tual message by bitwise exclusive-ORing the
otherwise, electronically. Digital cash usually message with the key, while the other one
refers to systems that are anonymous. Digi- just sends the key itself. The actual message
tal money systems can be used to imple- from this pair of participants is obtained by
ment any quantity that is conserved, such as XORing the two outputs. However, since no-
points, mass, dollars, etc. There are many body but the pair knows the original key,
variations of digital money systems, ranging the actual message cannot be traced to ei-
from VISA numbers to blinded signed digi- ther one of the participants.
tal coins. A topic too large for a single glos-
sary entry. discrete logarithm problem
given integers a, n, and x, find some integer
digital pseudonym m such that a^m mod n = x, if m exists.
basically, a "crypto identity." A way for indi- Modular exponentiation, the a^m mod n
viduals to set up accounts with various or- part, is straightforward (and special purpose
ganizations without revealing more infor- chips are available), but the inverse problem
mation than they wish. Users may have sev- is believed to be very hard, in general. Thus
eral digital pseudonyms, some used only it is conjectured that modular exponentia-
once, some used over the course of many tion is a one-way function.
years. Ideally, the pseudonyms can be linked
only at the will of the holder. In the simplest DSS, Digital Signature Standard
form, a public key can serve as a digital the latest NIST (National Institute of Stand-
pseudonym and need not be linked to a ards and Technology, successor to NBS)
physical identity. standard for digital signatures. Based on the
El Gamal cipher, some consider it weak and
digital signature
poor substitute for RSA-based signature known-plaintext attack
schemes. a cryptanalysis of a cipher where plaintext-
ciphertext pairs are known. This attack
eavesdropping, or passive wiretapping searches for an unknown key. Contrast with
intercepting messages without detection. the chosen plaintext attack, where the crypt-
Radio waves may be intercepted, phone analyst can also choose the plaintext to be
lines may be tapped, and computers may enciphered.
have RF emissions detected. Even fiber optic
lines can be tapped. mail, untraceable
a system for sending and receiving mail
factoring without traceability or observability. Receiv-
Some large numbers are difficult to factor. It ing mail anonymously can be done with
is conjectured that there are no feasible-- broadcast of the mail in encrypted form.
i.e."easy," less than exponential in size of Only the intended recipient (whose identity,
number-- factoring methods. It is also an or true name, may be unknown to the
open problem whether RSA may be broken sender) may able to decipher the message.
more easily than by factoring the modulus Sending mail anonymously apparently re-
(e.g., the public key might reveal infor- quires mixes or use of the dining cryptogra-
mation which simplifies the problem). Inter- phers (DC) protocol.
estingly, though factoring is believed to be
"hard", it is not known to be in the class of minimum disclosure proofs
NP-hard problems. Professor Janek invented another name for zero knowledge proofs,
a factoring device, but he is believed to be favored by Chaum.
fictional.
mixes
information-theoretic security "unbreakable" David Chaum's term for a box which per-
security, in which no amount of cryptanaly- forms the function of mixing, or decorrelat-
sis can break a cipher or system. One time ing, incoming and outgoing electronic mail
pads are an example (providing the pads are messages. The box also strips off the outer
not lost nor stolen nor used more than envelope (i.e., decrypts with its private key)
once, of course). Same as unconditionally and remails the message to the apress on
secure. the inner envelope. Tamper-resistant mod-
ules may be used to prevent cheating and
key forced disclosure of the mapping between
a piece of information needed to encipher incoming and outgoing mail. A sequence of
or decipher a message. Keys may be stolen, many remailings effectively makes tracing
bought, lost, etc., just as with physical keys. sending and receiving impossible. Contrast
this with the software version, the DC proto-
key exchange, or key distribution col.
the process of sharing a key with some
other party, in the case of symmetric ci- modular exponentiation
phers, or of distributing a public key in an raising an integer to the power of another
asymmetric cipher. A major issue is that the integer, modulo some integer. For integers
keys be exchanged reliably and without a, n, and m, a^m mod n. For example, 5^3
compromise. Diffie and Hellman devised mod 100 = 25. Modular exponentiation can
one such scheme, based on the discrete be done fairly quickly with a sequence of bit
logarithm problem. shifts and aps, and special purpose chips
have been designed. See also discrete loga- time pad, can easily recover the plaintext.
rithm. Provided the pad is only used once and
then destroyed, and is not available to an
National Security Agency (NSA) eavesdropper, the system is perfectly se-
the largest intelligence agency, responsible cure, i.e., it is information-theoretically se-
for making and breaking ciphers, for inter- cure. Key distribution (the pad) is obviously
cepting communications, and for ensuring a practical concern, but consider CD-ROM's.
the security of U.S. computers. Headquar-
tered in Fort Meade, Maryland, with many one-way function
listening posts around the world. The NSA a function which is easy to compute in one
funds cryptographic research and advises direction but hard to find any inverse for,
other agencies about cryptographic matters. e.g. modular exponentiation, where the in-
The NSA once obviously had the world's verse problem is known as the discrete log-
leading cryptologists, but this may no arithm problem. Compare the special case
longer be the case. of trap door one-way functions. An example
of a one-way operation is multiplication: it is
negative credential easy to multiply two prime numbers of 100
a credential that you possess that you don't digits to produce a 200-digit number, but
want any one else to know, for example, a hard to factor that 200-digit number.
bankruptcy filing. A formal version of a neg-
ative reputation. P ?=? NP
Certainly the most important unsolved
NP-complete problem in complexity theory. If P = NP,
a large class of difficult problems. "NP" then cryptography as we know it today does
stands for nondeterministic polynomial not exist. If P = NP, all NP problems are
time, a class of problems thought in general "easy."
not to have feasible algorithms for their so-
lution. A problem is "complete" if any other paping
NP problem may be reduced to that prob- sending extra messages to confuse eaves-
lem. Many important combinatorial and al- droppers and to defeat traffic analysis. Also
gebraic problems are NP-complete: the aping random bits to a message to be enci-
traveling salesman problem, the Hamilto- phered.
nian cycle problem, the word problem, and
on and on. plaintext
also called cleartext, the text that is to be
oblivious transfer enciphered.
a cryptographic primitive that involves the
probabilistic transmission of bits. The sender Pretty Good Privacy (PGP)
does not know if the bits were received. Phillip Zimmerman's implementation of
RSA, recently upgraded to version 2.0, with
one-time pad more robust components and several new
a string of randomly-selected bits or sym- features. RSA Data Security has threatened
bols which is combined with a plaintext PZ so he no longer works on it. Version 2.0
message to produce the ciphertext. This was written by a consortium of non-U.S.
combination may be shifting letters some hackers.
amount, bitwise exclusive-ORed, etc.). The
recipient, who also has a copy of the one prime numbers
integers with no factors other than them- public key cryptosystem
selves and 1. The number of primes is un- the modern breakthrough in cryptology, de-
bounded. About 1% of the 100 decimal digit signed by Diffie and Hellman, with contribu-
numbers are prime. Since there are about tions from several others. Uses trap door
10^70 particles in the universe, there are one-way functions so that encryption may
about 10^23 100 digit primes for each and be done by anyone with access to the "pub-
every particle in the universe! lic key" but decryption may be done only by
the holder of the "private key." Encom-
probabilistic encryption passes public key encryption, digital signa-
a scheme by Goldwasser, Micali, and Blum tures, digital cash, and many other protocols
that allows multiple ciphertexts for the same and applications.
plaintext, i.e., any given plaintext may have
many ciphertexts if the ciphering is re- public key encryption
peated. This protects against certain types the use of modern cryptologic methods to
of known ciphertext attacks on RSA. provided message security and authentica-
tion. The RSA algorithm is the most widely
proofs of identity used form of public key encryption, alt-
proving who you are, either your true name, hough other systems exist. A public key may
or your digital identity. Generally, posses- be freely published, e.g., in phonebook-like
sion of the right key is sufficient proof directories, while the corresponding private
(guard your key!). Some work has been key is closely guarded.
done on "is-a-person" credentialling agen-
cies, using the so-called Fiat-Shamir proto- public key patents
col...think of this as a way to issue unforgea- M.I.T. and Stanford, due to the work of
ble digital passports. Physical proof of iden- Rivest, Shamir, Adleman, Diffie, Hellman,
tity may be done with biometric security and Merkle, formed Public Key Partners to
methods. Zero knowledge proofs of identity license the various public key, digital signa-
reveal nothing beyond the fact that the ture, and RSA patents. These patents,
identity is as claimed. This has obvious uses granted in the early 1980s, expire in the be-
for computer access, passwords, etc. tween 1998 and 2002. PKP has licensed RSA
Data Security Inc., of Redwood City, CA,
protocol which handles the sales, etc.
a formal procedure for solving some prob-
lem. Modern cryptology is mostly about the quantum cryptography
study of protocols for many problems, such a system based on quantum-mechanical
as coin-flipping, bit commitment (blobs), principles. Eavesdroppers alter the quantum
zero knowledge proofs, dining cryptogra- state of the system and so are detected. De-
phers, and so on. veloped by Brassard and Bennett, only small
laboratory demonstrations have been made.
public key
the key distributed publicly to potential reputations
message-senders. It may be published in a the trail of positive and negative associa-
phonebook-like directory or otherwise sent. tions and judgments that some entity ac-
A major concern is the validity of this public crues. Credit ratings, academic credentials,
key to guard against spoofing or imperson- and trustworthiness are all examples. A digi-
ation. tal pseudonym will accrue these reputation
credentials based on actions, opinions of
others, etc. In crypto anarchy, reputations or one-key system. Contrast with public key
and agoric systems will be of paramount im- cryptosystem.
portance. There are many fascinating issues
of how reputation-based systems work, how smart cards
credentials can be bought and sold, and so a computer chip embeped in credit card.
forth. They can hold cash, credentials, crypto-
graphic keys, etc. Usually these are built
RSA with some degree of tamper-resistance.
the main public key encryption algorithm, Smart cards may perform part of a crypto
developed by Ron Rivest, Adi Shamir, and transaction, or all of it. Performing part of it
Kenneth Adleman. It exploits the difficulty of may mean checking the computations of a
factoring large numbers to create a private more powerful computer, e.g., one in an
key and public key. First invented in 1978, it ATM.
remains the core of modern public key sys-
tems. It is usually much slower than DES, but spoofing, or masquerading
special-purpose modular exponentiation posing as another user. Used for stealing
chips will likely speed it up. A popular passwords, modifying files, and stealing
scheme for speed is to use RSA to transmit cash. Digital signatures and other authenti-
session keys and then a high-speed cipher cation methods are useful to prevent this.
like DES for the actual message text. Public keys must be validated and protected
to ensure that others don't substitute their
Description own public keys which users may then un-
Let p and q be large primes, typically with wittingly use.
more than 100 digits. Let n = pq and find
some e such that e is relatively prime to (p - steganography
1)(q - 1). The set of numbers p, q, and e is a part of cryptology dealing with hiding
the private key for RSA. The set of numbers messages and obscuring who is sending
n and e forms the public key (recall that and receiving messages. Message traffic is
knowing n is not sufficient to easily find p often paped to reduce the signals that
and q...the factoring problem). A message M would otherwise come from a supen begin-
is encrypted by computing M^e mod n. The ning of messages.
owner of the private key can decrypt the en-
crypted message by exploiting number the- symmetric cipher
ory results, as follows. An integer d is com- same as private key cryptosystem.
puted such that ed =1 (mod (p - 1)(q - 1)).
Euler proved a theorem that M^(ed) = M tamper-responding modules, tamper-resistant
mod n and so M^(ed) mod n = M. This modules (TRMs)
means that in some sense the integers e sealed boxes or modules which are hard to
and d are "inverses" of each other. [If this is open, requiring extensive probing and usu-
unclear, please see one of the many texts ally leaving ample evidence that the tam-
and articles on public key encryption.] pering has occurred. Various protective
techniques are used, such as special metal
secret key cryptosystem or oxide layers on chips, armored coatings,
A system which uses the same key to en- embeped optical fibers, and other measures
crypt and decrypt traffic at each end of a to thwart analysis. Popularly called "tamper-
communication link. Also called a symmetric
proof boxes." Uses include: smart cards, nu- compute the function in the forward direc-
clear weapon initiators, cryptographic key tion does not provide information on how
holders, ATMs, etc. to compute the function in the reverse di-
rection. More simply put, trap-door one way
tampering, or active wiretapping functions are one way for all but the holder
interfering with messages and possibly of the secret information. The RSA algorithm
modifying them. This may compromise data is the best-known example of such a func-
security, help to break ciphers, etc. See also tion.
spoofing.
unconditional security
token same as information-theoretic security, that
some representation, such as ID cards, sub- is, unbreakable except by loss or theft of the
way tokens, money, etc., that indicates pos- key.
session of some property or value.
unconditionally secure
traffic analysis where no amount of intercepted ciphertext
determining who is sending or receiving is enough to allow the cipher to be broken,
messages by analyzing packets, frequency as with the use of a one-time pad cipher.
of packets, etc. A part of steganography. Contrast with computationally secure.
Usually handled with traffic paping.
voting, cryptographic
transmission rules Various schemes have been devised for
the protocols for determining who can send anonymous, untraceable voting. Voting
messages in a DC protocol, and when. These schemes should have several properties: pri-
rules are needed to prevent collision and vacy of the vote, security of the vote (no
deliberate jamming of the channels. multiple votes), robustness against disrup-
tion by jammers or disrupters, verifiability
trap messages (voter has confidence in the results), and ef-
dummy messages in DC Nets which are ficiency.
used to catch jammers and disrupters. The
messages contain no private information zero knowledge proofs
and are published in a blob beforehand so proofs in which no knowledge of the actual
that the trap message can later be opened proof is conveyed. Peggy the Prover
to reveal the disrupter. (There are many demonstrates to Sid the Skeptic that she is
strategies to explore here.) indeed in possession of some piece of
knowledge without actually revealing any of
trap-door that knowledge. This is useful for access to
In cryptography, a piece of secret infor- computers, because eavesdroppers or dis-
mation that allows the holder of a private honest sysops cannot steal the knowledge
key to invert a normally hard to invert func- given. Also called minimum disclosure
tion. proofs. Useful for proving possession of
some property, or credential, such as age or
trap-door one way functions voting status, without revealing personal in-
functions which are easy to compute in both formation.
the forward and reverse direction but for
which the disclosure of an algorithm to

Anda mungkin juga menyukai