Forwarded message:

From: "Paul F. Doyle" <p...@proofspace.com>
To: <pe...@piermont.com>,
        <neuh...@st.cs.uni-sb.de>
Cc: <d...@geer.org>
Subject: Re: [Barker, Elaine B.] NIST Publication Announcements
Date: Wed, 30 Sep 2009 09:55:36 -0400

Hello Perry and Stephan (cc: Dan Geer),

Dan Geer forwarded a message thread from the crypto mailing list.

There is an approach to Trusted Time Stamping you may find interesting,
useful and rather different given the circumstances you've described in the
thread.  It is known as the Transient Key Method and is NOT based on a
conventional PKI method for generating cryptographic time stamps, but
instead a fully distributed, web-style, self-validating model.

I would be happy to describe the Transient Key Method in detail if this
would be helpful and can forward along some background documentation if you
are interested.  BTW, it is one of the methods included in the American
National Standard X9.95.

Please let me know how I can be of assistance.

Thanks,
--Paul

"A life without integrity is meaningless...
...a record or dataset without integrity is worthless!"

Paul F. Doyle
Founder & CEO
Proofspace
P.O. Box 369
Ada, MI  49301
v. 616-458-5733
m. 616-292-8350
f. 866-685-2386/616-458-2271
www.proofspace.com
LinkedIn: www.linkedin.com/in/paulfdoyle
e. p...@proofspace.com
skype. paul_proofspace

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to