Perspectives on Financial Cryptography

نویسنده

  • Ronald L. Rivest
چکیده

I present some debatable propositions about financial systems and financial cryptography. (Warning: the propositions expressed may or may not be believed by the author, and may be phrased in a deliberately provocative manner. They may contradict each other. This paper follows the author's slides closely, and does not have all of the ancillary comments of the author and the audience.) 1 I n t e r n e t m o n e y is t h e s a m e as I n t e r s t e l l a r m o n e y P r o p o s i t i o n 1: There is little difference between lnternet payment schemes and interstellar payment schemes. In 2097, you will buy info off the GGG (the Grand Galactic Grid, successor to the WWW) with "st arbucks." Is galactic space very different than cyberspace? (Think of star systems as analogous to computers on the Internet, and interstellar radio communication as a somewhat slower version of the Internet.) Do payment systems need to depend upon physical proximity, national governments, or the ability to haul someone off to jail? One can hope that trade in the Galactic Federation will be based on more than simple barter. 2 M o s t p a y m e n t s c h e m e s h a v e n ' t w o r k e d w e l l P r o p o s i t i o n 2: Historically, most payment schemes haven't worked very well. Good references on payment systems are Weatherford's History of Money[3] and Galbraith's Money[2]. Commodities (metal, tobacco, wampum, cocoa beans, etc.) have problems with weighing, purity, quality, deterioration, transportation, storage, theft. Coins (invented in the western world in Lydia, around 630 B.C.) have problems with shaving, debasing, theft, and government abuse. Paper money (seen by Marco Polo in China, reinvented in Italy to help get around usury laws, and used widely in colonial U.S.) has problems with counterfeiting (now using computer scanners and color printers), and government abuse (inflation).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Behavioral Perspectives on Central Bank Communication for Financial Stability

Analyzing central bank communication during financial crises, we draw on a surprisingly informative parallel between management of natural disasters such as earthquakes on one hand, and the corresponding communication infrastructure and social interaction during financial turmoil, on the other. The role of social and emotional behavior thereof points to the importance of interpersonal comm...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game

A (or a group of) selling agent wants to allocate and sell a (or a set of) parcel of land optimally and fairly to a buying agent within the capacity constraint of the selling agent and budget constraint of the buying agent. This problem has been solved by combining the concept of algorithmic cooperative game theory and financial cryptography. This is an approach for a group of decision-making a...

متن کامل

The Business of Electronic Voting

This work reports on a Financial Cryptography 2001 panel where we concentrated on the emerging business of electronic voting.

متن کامل

Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation

We consider certificate revocation from three high-level perspectives: temporal nonmonotonicity, user interfaces, and risk management. We argue that flawed understanding of these three aspects of revocation schemes has caused these schemes to be unnecessarily costly, complex, and confusing. We also comment briefly on some previous works, including those of Rivest [16], Fox and LaMacchia [5], an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997