Forwarded message: From: "Paul F. Doyle" <p...@proofspace.com> To: <pe...@piermont.com>, <neuh...@st.cs.uni-sb.de> Cc: <d...@geer.org> Subject: Re: [Barker, Elaine B.] NIST Publication Announcements Date: Wed, 30 Sep 2009 09:55:36 -0400
Hello Perry and Stephan (cc: Dan Geer), Dan Geer forwarded a message thread from the crypto mailing list. There is an approach to Trusted Time Stamping you may find interesting, useful and rather different given the circumstances you've described in the thread. It is known as the Transient Key Method and is NOT based on a conventional PKI method for generating cryptographic time stamps, but instead a fully distributed, web-style, self-validating model. I would be happy to describe the Transient Key Method in detail if this would be helpful and can forward along some background documentation if you are interested. BTW, it is one of the methods included in the American National Standard X9.95. Please let me know how I can be of assistance. Thanks, --Paul "A life without integrity is meaningless... ...a record or dataset without integrity is worthless!" Paul F. Doyle Founder & CEO Proofspace P.O. Box 369 Ada, MI 49301 v. 616-458-5733 m. 616-292-8350 f. 866-685-2386/616-458-2271 www.proofspace.com LinkedIn: www.linkedin.com/in/paulfdoyle e. p...@proofspace.com skype. paul_proofspace --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com