At 5:05 AM +0800 3/8/2000, Arrianto Mukti Wibowo wrote:
>Hi,
>
>I want to know whether there is a crypto building block which doesn't allow
>someone to open an encrypted message before a certain date.
>
>[Damn hard. Math functions don't grok "date". The only reasonable way
>to do this without a trusted third party is to pick an encryption
>algorithm that will take at least as long to decrypt (in likely
>available computer time) as are needed. -Perry]
>
>In another word, I need to know several "date/time-related" crypto papers
>around. Can somebody give me pointers?
>

Here is something I posted to sci.crypt on the subject in 1996. (You 
can find it at http://deja.com/usenet by searching on the thread: ' 
Cryptographically secured "Time Vaults" '):
 
  PGP and the Packwood problem.
  Arnold G. Reinhold
  January 19, 1996
 
  The downfall of Senator Packwood of Oregon after his diaries were
  subpoenaed by the Ethics committee of the US Senate may have
  brought to justice a man who abused the public trust, but it must also
  worry historians. Even though Packwood helped surface his
  diaries by attempting to use them in his own defense, many
  politicians will be reluctant to keep candid, private diaries in the future.
 
  Cryptography can provide at least a partial answer to this
  problem. I would propose that some recognized historical societies publish a
  series of PGP public keys. The corresponding private
  keys would be held in escrow for a fixed time frame and then
  released to the public at one year intervals on or about December 31. Thus
  there might be a 1996 key which would become public on Dec 31, 1996, a
  1997 key that would be revealed on December 31, 1997, and so on. The
  keys could be produced at a special event held in conjunction with a
  historical or cryptography meeting. Two
  hundred years worth of keys, say through the year 2100 could be
  generated at one session. The secret keys would be kept both in magnetic
  and printed form, say in a Swiss bank. Or the secret keys might also be
  split into thirds, with two copies of each third and distributed to six
  societies world wide.
 
  Anyone who wished could down load  one of the keys from the
  standard key servers. The key fingerprints might be printed in
  one or more historical journals.  A diarist could simply use the key to
  encrypt his work or use the key to encrypt his own private key. The later
  option would allow him access to his own diaries. He
  could destroy his unencrypted key when trouble arose, before it was
  subpoenaed.
 
  There is always the threat that a judge could attempt to subpoena the
  historical societies' private keys. That is why the keys should be kept in
  countries whose laws would make that difficult. Since the keys might be
  used by more than one individual, the societies might have a strong
  argument against releasing them.
 
  There is also the danger that technology might overtake the
  public key technology that was used in making the keys, In that case the
  historical societies could make new, longer keys. Since the existence of most
  diaries would still be secret, the diarists or their estates could 
super-encrypt
  with the new keys.
 
  The technology threat suggests another option for a secret diarist: He
  could make a guess as to when a certain key size is likely to be breakable.
  He could then make a key of that size and throw away the public key. If he
  did this in front of witnesses, he could have a subpoena-proof diary with
  confidence that his words would
  become readable eventually.

Reply via email to