do NOT escrow communications keys

Anonymous nobody at REPLAY.COM
Fri Oct 10 20:05:44 PDT 1997



> > There may be patents on these technologies, too.
>
> Don't think so.  It's simple enough technology.

Take a look at 5493614 : Private signature and proof systems

INVENTORS: Chaum; David, Sherman Oaks, CA 91403
ISSUED: Feb. 20, 1996
FILED: May 3 , 1994

ABSTRACT:   Cryptographic methods and apparatus for forming (102) and
verifying (103) private signatures and proofs (203,204, 207, and 209)
are disclosed. Such a signature convinces the intended recipient that it
is a valid undeniable or designated-confirmer signature. And such a proof
convinces the intended recipient, just as any cryptographic proof. Even
though the signatures and proofs are convincing to the intended recipient,
they are not convincing to others who may obtain them. Unlike previously
known techniques for convincing without transferring the ability to
convince others, those disclosed here do not require interaction--a
signature or proof can simply be sent as a single message. Because
the intended recipient can forge the signatures and proofs, they are
not convincing to others; but since only the intended recipient can
forge them, they are convincing to the intended recipient. Exemplary
embodiments use a cryptographic challenge value that is said to pivot on
a trap-door function, in that the value can be manipulated by those with
the corresponding trap-door information, and is believed impractical to
manipulate without it.







More information about the cypherpunks-legacy mailing list