A Measure of Sacrifice (On Time) | Why were two technologies from two very different crafts traditions -- the mechanical clock and the sandglass -- invented at the same time and place? |
Update -- Scarce Objects | An architecture for usage control (not mere access control) for distributed objects interacting across trust boundaries. |
Update -- Shelling Out -- The Origins of Money | The origins, functions and aesthetic, monetary, and security properties of proto-money. |
Origins of the Non-Delegation Doctrine | An analysis of the delegation (or lack thereof) of the power to make law from the legislative to the executive branch in the early United States, uncovering some distinctions and factors that may shed light on modern non-delegation cases, and introducing representation distance and the principle of least authority as constitutional doctrines. |
I delivered the keynote speech, on smart contracts, at the IEEE International Workshop on Electronic Contracting (WEC), San Diego, California, USA on July 6, 2004. Here are the slides from that talk. |
Hermeneutics | The interpretation of traditional texts. Recommended by Yahoo! Directory and Google Directory. |
An Introduction to Algorithmic Information Theory |
WorldBook Encyclopedia top 10 reference for information theory.
|
Contracts with Bearer | How blinded digital cash works, and how it more generally provides a protocol for electronic bearer certificates and protecting scarce online resources. |
A Formal Language for Analyzing Contracts | Useful for financial cryptography, risk analysis, and accounting for the value of derivatives, combinations, and other sophsticated contracts. |
Advances In Distributed Security | The new paradigm of very highly probable, rather than absolutely certain, security has led to a raft of new possibilities for securing distributed applications. For the first time we can implement on the Internet crucial integrity properties and applications -- including synchronized clocks, unforgeable transactions, and censorship-proof publishing. |
Rights, Remedies, and Security Models | Legal concepts and terminology can shed light on computer security problems, such as delegation of authority. |
Scarce Objects | An architecture for usage control (not mere access control) for distributed objects interacting across trust boundaries. |
Patterns of Integrity -- Separation of Duties | A recurring and reusable pattern for controlling dangerous functions. |
Formalizing and Securing Relationships on Public Networks | Smart contracts -- embedding rules in technology. |
A Formal Language for Analyzing Contracts | A computer-readable language for drafting rules and analyzing their consequences, and for embedding rules in technology. |
Contracts with Bearer | How blinded digital cash works, and how it more generally provides a protocol for electronic bearer certificates and protecting scarce online resources. |
Secure Property Titles with Owner Authority | Secure agreements on name spaces and other property rights. |
Shelling Out -- The Origins of Money |
The nature and origins of money. Aesthetic, monetary, and security properties of collectibles. |
The Playdough Protocols | Tamper evident techology and the protection of commerce. |
A Measure of Sacrifice (On Time) | The hourglass and mechanical clock -- how and why medieval Europe developed a secure system for specifying the time of events. |
The God Protocols |
Trustworthy computations with untrusted parties -- ITAudit Vol. # 2 November 15, 1999 |
Intrapolynomial Cryptography |
Spammers may use custom architectures to beat compute-cost postage schemes. |
Absolute Compression and True Randomness |
Some "real random" numbers may not be very random. |
The Abuse of Statistics in Cryptography |
Misunderstandings about randomness can compromise cipher design. |
There is No Universal Security Architecture |
The best security architecture depends on the kinds of relationships to be protected. |
Distributing Authorities and Verifying Their Claims | Trust no one (who writes for "The X-Files"). |
Trusted Third Parties are Security Holes | The role of trust assumptions in secure protocol design. |
Coalition Design for Secure Protocols |
Recent breakthroughs in reasoning about coalitions and protocols. |
![]() |
Clay envelope and tokens, Sumer, c. 3,400 B.C. |
![]() |
Silver ring and coil money, Sumer, c. 2,500 B.C. |
Shelling Out |
The nature and origins of money. The aesthetics and monetary properties of collectibles. The first institutions allowed humans to cooperate more than other animals. |
The Playdough Protocols | How tamper evident technology led to the first contracts and accounts -- and then the birth of writing and mathematics. |
Measuring Value | A fundamental problem shaping the history of institutions. |
A Measure of Sacrifice (On Time) | The hourglass, mechanical clock, and how we have spent most of our days since. |
Brehon Law |
A decentralized, pre-literate legal system with lessons for a multimedia age. |
Recovering Privity |
A pre- and post-industrial concept of knowledge, relationships, and responsibility. |
History of Commercial Law | Links to resources. |
The Mental Accounting
Barrier to Micropayments Prices don't come for free.
Mental Transaction Costs and Micropayments (Presented at 2nd Berlin Internet Economics Workshop, May 1999)
Coalition Design for Secure Protocols | How parties that don't trust each other can securely agree on inputs and compute results. |
Secure Property Titles with Owner Authority | Secure agreements on name spaces and other property rights |
Proplets | Architecture for securing and transferring physical property |
Formalizing and Securing Relationships on Public Networks
| A survey of security for smart contracts -- First Monday, September 1997. |
The God Protocols | Trustworthy computations with untrusted parties -- ITAudit Vol. # 2 November 15, 1999 |
Trusted Services and Group Controls | Making trusted third parties trustworthy, to some extent, and the tradeoffs involved. |
Trusted Third Parties are Security Holes | Or not. |
Negative Reputations | Blacklisting as security. Introducing Chaumian credentials. |
Contracts with Bearer | A generalization of digital cash. |
My worldview draws heavily from scientific methods, including theoretical
and personal applied
science.
DigiCash