cryptography has mainly been applied to securing communication - but transferring data across a network is not the only way to communicate. By persisting data into a store, we are effectively sending messages into the future! This can also be secured -g but the approach is quite different - and the result is a database that can be verified offline - that data itself is secure - even if we have received our copy of the database from a malicious node.
I will show how this is possible just using simple cryptographic primitives (just hashes and signatures) structured in the right way.
cryptography has mainly been applied to securing communication - but transferring data across a network is not the only way to communicate. By persisting data into a store, we are effectively sending messages into the future! This can also be secured -g but the approach is quite different - and the result is a database that can be verified offline - that data itself is secure - even if we have received our copy of the database from a malicious node.
I will show how this is possible just using simple cryptographic primitives (just hashes and signatures) structured in the right way.