Financial cryptography

Financial cryptography (FC) is the use of cryptography in applications in which financial loss could result from subversion of the message system.

Cryptographers think of the field as originating in the work of Dr David Chaum who invented the blinded signature. This special form of a cryptographic signature permitted a virtual coin to be signed without the signer seeing the actual coin, and permitted a form of digital token money that offered untraceability. This form is sometimes known as Digital Cash.

A widely-used and previously-developed cryptographic mechanism is the Data Encryption Standard, which was used primarily for the protection of electronic funds transfers. However, it was the work of David Chaum that excited the cryptography community about the potential of encrypted messages as actual financial instruments.

Financial cryptography includes the mechanisms and algorithms necessary for the protection of financial transfers, in addition to the creation of new forms of money. Proof of work and various auction protocols fall under the umbrella of Financial Cryptography. Hashcash is being used to limit spam.

Financial cryptography is distinguished from traditional cryptography in that for most of recorded history, cryptography has been used almost entirely for military and diplomatic purposes.

As part of a business model, FC followed the guide of cryptography and only the simplest ideas were adopted. Account money systems protected by SSL such as PayPal, e-gold and GoldMoney were relatively successful, but more innovative mechanisms, including blinded token money, were not.

Financial cryptography is frequently seen to have a very broad scope of application. Ian Grigg sees financial cryptograpy in seven layers [http://iang.org/papers/fc7.html] , being the combination of seven distinct disciplines: cryptography, software engineering, rights, accounting, governance, value, and financial applications. Business failures can often be traced to the absence of one or more of these disciplines, or to poor application of them. This views FC as an appropriately crossdiscipline subject. Indeed, inevitably so, given that finance and cryptography are each built upon multiple disciplines.

Financial cryptography is to some extent organized around the annual meeting of the International Financial Cryptography Association [http://www.ifca.ai/ Financial Cryptography] , which is held each year in a different location.

ee also

*Automated teller machines (ATM)
*Point-of-sale (POS)
*Hardware Security Modules (HSM)
* Electronic money
* Payments systems
* Loyalty and corporate monies
* Smart contracts
* Funds transfer
* Anonymous internet banking
* Economics of security
* Bilateral key exchange

External links

* [http://www.ifca.ai/ International Financial Cryptography Association]
* [http://fincrypt.blogspot.com/ Fincrypt weblog]
* [https://www.financialcryptography.com/ Financial Cryptography weblog]
* [http://szabo.best.vwh.net/bearer_contracts.html Contracts with bearer]


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Financial privacy — is a blanket term for a multitude of privacy issues:*Financial Institutions ensuring that their customers information remains private to those outside the institution. Issues include the Patriot Act, and other debates of privacy vs. security.*The …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Certco (financial services) — CertCo was a financial cryptography startup spun out of Bankers Trust in the 1990s. It had offices in New York City and Cambridge, Massachusetts. It offered three main public key infrastructure (PKI) based products: an Identity Warranty system… …   Wikipedia

  • History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… …   Wikipedia

  • Server gated cryptography — (SGC) was created in response to United States federal legislation on the export of strong cryptography in the 1990s.The legislation had limited encryption to weak algorithms and shorter key lengths if used in software outside of the United… …   Wikipedia

  • Export of cryptography in the United States — The export of cryptography in the United States is the transfer from the United States to another country of devices and technology related to cryptography. Since World War II, many governments, including the U.S. and its NATO allies, have… …   Wikipedia

  • Export of cryptography — The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.Since World War II, Western governments, including the U.S. and its NATO allies, have regulated the export of cryptography… …   Wikipedia

  • Elliptic Curve Cryptography — Elliptische Kurve über Unter Elliptic Curve Cryptography (ECC) oder deutsch Elliptische Kurven Kryptographie versteht man asymmetrische Kryptosysteme, die Operationen auf elliptischen Kurven über endlichen Körpern v …   Deutsch Wikipedia

  • Malleability (cryptography) — Malleability is a property of some cryptographic algorithms.[1] An encryption algorithm is malleable if it is possible for an adversary to transform a ciphertext into another ciphertext which decrypts to a related plaintext. That is, given an… …   Wikipedia

  • Cypherpunk — Not to be confused with Cyberpunk. A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups… …   Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.