Improvements to Time Bracketed Authentication

From Simple Sci Wiki
Revision as of 14:08, 24 December 2023 by SatoshiNakamoto (talk | contribs) (Created page with "Title: Improvements to Time Bracketed Authentication Research Question: How can we create a system that allows for the creation of authentic, tamper-proof recordings, even when the equipment operators are untrustworthy? Methodology: The study proposes a collection of techniques that utilize the interplay between private and public information. The central feature of these techniques is the use of time-bracketed authentication. This method combines two old ideas: the ki...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Title: Improvements to Time Bracketed Authentication

Research Question: How can we create a system that allows for the creation of authentic, tamper-proof recordings, even when the equipment operators are untrustworthy?

Methodology: The study proposes a collection of techniques that utilize the interplay between private and public information. The central feature of these techniques is the use of time-bracketed authentication. This method combines two old ideas: the kidnapper's trick of photographing a hostage holding today's newspaper to prove the hostage is still alive (past time bracket), and the inventor's practice of publishing an invention or getting it postmarked to prove the invention's origin (future time bracket).

Results: The study demonstrates how these techniques can be applied to audiovisual or other recordings to create authentic, tamper-proof recordings. The researchers show how the system can be used to create recordings that are difficult to falsify, pre-date, or post-date, even by the makers and operators of the recording equipment.

Implications: The research suggests that time-bracketed authentication can be a valuable tool in creating authentic, tamper-proof recordings. However, the researchers also acknowledge that these recordings can be abused for blackmail or harassment. To reduce this risk, they suggest the use of encryption and secret sharing.

In conclusion, the study presents a novel approach to creating authentic, tamper-proof recordings that can be trusted by the public. The techniques proposed have the potential to revolutionize the way we document significant events and settle disputes.

Link to Article: https://arxiv.org/abs/0308026v1 Authors: arXiv ID: 0308026v1