Artifact Content
Not logged in

Artifact 14ff92efb518a00258bf09a491ecc10f51778ef6:

Wiki page [Experiment: Chainsignature] by martin_vahi on 2017-05-26 17:45:26.
D 2017-05-26T17:45:26.792
L Experiment:\sChainsignature
P b8f7e76da77e827d1db93fc2432995d04c338223
U martin_vahi
W 1603
<p><b>The purpose of a signature is to authenticate the creator of the signed
object.</b>&nbsp;</p>

<p>In the case of blind dates, internet shopping <b>there is nothing to
authenticate at the first exchange of information</b>, because all merchants
and blind date partners are total strangers anyway. What matters is that the
correspondence that follows the first exchange of information is with the same
stranger, not with some other stranger.&nbsp;</p>

<p><br>
</p>

<h1>The Scheme</h1>

<p>The scheme is that message M_n signature is a secure hash of a concatenation
of all messages since the first message, message M_n included. If M_1 is a file
with the very first message that the signer sent and M_2 is the 2. message that
the signer sent, then a way to calculate the signature is:</p>
<pre>    cat ./M_1.blob  &gt; ./x.blob   # The "&gt;" is required for overwriting the old x.blob .</pre>
<pre>    cat ./M_2.blob &gt;&gt; ./x.blob   # The "&gt;&gt;" in stead of the "&gt;" is </pre>
<pre>                                 # required to add in stead of overwriting.</pre>
<pre>    cat ./M_3.blob &gt;&gt; ./x.blob</pre>
<pre>    ...</pre>
<pre>    cat ./M_n.blob &gt;&gt; ./x.blob</pre>
<pre>    sha256sum ./x.blob &gt; ./the_signature.txt</pre>

<p><br>
</p>

<p>The M_n must be included to the signature calculation x.blob to make sure
that an eavesdropper can not reuse the signature for signing its own message.
To make eavesdropping more difficult, different messages might be sent through
different channels.</p>

<p><br>
</p>

<h1>Optional Bootstrapping</h1>

<p><br>
</p>

<p><br>
</p>

Z 41b2cd73a92b59b5c172793aee8d922d