Financial cryptography (FC) is the use of
cryptographyin applications in which financial loss could result from subversion of the message system.
Cryptographers think of the field as originating in the work of Dr
David Chaumwho invented the blinded signature. This special form of a cryptographic signature permitted a virtual coin to be signed without the signer seeing the actual coin, and permitted a form of digital token moneythat offered untraceability. This form is sometimes known as Digital Cash.
A widely-used and previously-developed cryptographic mechanism is the
Data Encryption Standard, which was used primarily for the protection of electronic funds transfers. However, it was the work of David Chaumthat excited the cryptography community about the potential of encrypted messages as actual financial instruments.
Financial cryptography includes the mechanisms and algorithms necessary for the protection of financial transfers, in addition to the creation of new forms of money.
Proof of workand various auctionprotocols fall under the umbrella of Financial Cryptography. Hashcashis being used to limit spam.
Financial cryptography is distinguished from traditional
cryptographyin that for most of recorded history, cryptography has been used almost entirely for military and diplomatic purposes.
As part of a business model, FC followed the guide of cryptography and only the simplest ideas were adopted. Account money systems protected by SSL such as
PayPal, e-goldand GoldMoneywere relatively successful, but more innovative mechanisms, including blinded token money, were not.
Financial cryptography is frequently seen to have a very broad scope of application. Ian Grigg sees financial cryptograpy in seven layers [http://iang.org/papers/fc7.html] , being the combination of seven distinct disciplines: cryptography,
software engineering, rights, accounting, governance, value, and financial applications. Business failures can often be traced to the absence of one or more of these disciplines, or to poor application of them. This views FC as an appropriately crossdiscipline subject. Indeed, inevitably so, given that financeand cryptographyare each built upon multiple disciplines.
Financial cryptography is to some extent organized around the annual meeting of the International Financial Cryptography Association [http://www.ifca.ai/ Financial Cryptography] , which is held each year in a different location.
Automated teller machines (ATM)
Hardware Security Modules (HSM)
Loyalty and corporate monies
Anonymous internet banking
Economics of security
Bilateral key exchange
* [http://www.ifca.ai/ International Financial Cryptography Association]
* [http://fincrypt.blogspot.com/ Fincrypt weblog]
* [https://www.financialcryptography.com/ Financial Cryptography weblog]
* [http://szabo.best.vwh.net/bearer_contracts.html Contracts with bearer]
Wikimedia Foundation. 2010.
Look at other dictionaries:
Financial privacy — is a blanket term for a multitude of privacy issues:*Financial Institutions ensuring that their customers information remains private to those outside the institution. Issues include the Patriot Act, and other debates of privacy vs. security.*The … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Certco (financial services) — CertCo was a financial cryptography startup spun out of Bankers Trust in the 1990s. It had offices in New York City and Cambridge, Massachusetts. It offered three main public key infrastructure (PKI) based products: an Identity Warranty system… … Wikipedia
History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… … Wikipedia
Server gated cryptography — (SGC) was created in response to United States federal legislation on the export of strong cryptography in the 1990s.The legislation had limited encryption to weak algorithms and shorter key lengths if used in software outside of the United… … Wikipedia
Export of cryptography in the United States — The export of cryptography in the United States is the transfer from the United States to another country of devices and technology related to cryptography. Since World War II, many governments, including the U.S. and its NATO allies, have… … Wikipedia
Export of cryptography — The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.Since World War II, Western governments, including the U.S. and its NATO allies, have regulated the export of cryptography… … Wikipedia
Elliptic Curve Cryptography — Elliptische Kurve über Unter Elliptic Curve Cryptography (ECC) oder deutsch Elliptische Kurven Kryptographie versteht man asymmetrische Kryptosysteme, die Operationen auf elliptischen Kurven über endlichen Körpern v … Deutsch Wikipedia
Malleability (cryptography) — Malleability is a property of some cryptographic algorithms. An encryption algorithm is malleable if it is possible for an adversary to transform a ciphertext into another ciphertext which decrypts to a related plaintext. That is, given an… … Wikipedia
Cypherpunk — Not to be confused with Cyberpunk. A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups… … Wikipedia