David Chaum
David Chaum | |
---|---|
Born | 1955 (age 68–69) |
Alma mater | University of California, Berkeley |
Occupations | |
Known for |
|
Scientific career | |
Thesis | Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups (1982) |
Doctoral advisor | Bernard Marcel Mont-Reynaud |
Website | www |
David Lee Chaum (born 1955) is an American computer scientist, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of digital cash. His 1982 dissertation "Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups" is the first known proposal for a blockchain protocol.[1] Complete with the code to implement the protocol, Chaum's dissertation proposed all but one element of the blockchain later detailed in the Bitcoin whitepaper. He has been referred to as "the father of online anonymity",[2] and "the godfather of cryptocurrency".[3]
He is also known for developing
Life and career
Chaum is
Chaum received the Information Technology European Award for 1995.
Chaum resides in Sherman Oaks, Los Angeles.[16]
Notable research contributions
Vault systems
Recently credited by Alan Sherman's "On the Origins and Variations of Blockchain Technologies",[1] Chaum's 1982 Berkeley dissertation proposed every element of the blockchain found in Bitcoin except proof of work. The proposed vault system lays out a plan for achieving consensus state between nodes, chaining the history of consensus in blocks, and immutably time-stamping the chained data. The paper also lays out the specific code to implement such a protocol.
Digital cash
Chaum is credited as the inventor of secure digital cash for his 1983 paper, which also introduced the cryptographic primitive of a blind signature.[17] These ideas have been described as the technical roots of the vision of the Cypherpunk movement that began in the late 1980s.[18] Chaum's proposal allowed users to obtain digital currency from a bank and spend it in a manner that is untraceable by the bank or any other party.[19] In 1988, he extended this idea (with Amos Fiat and Moni Naor) to allow offline transactions that enable detection of double-spending.[20]
In 1990, he founded DigiCash, an electronic cash company, in Amsterdam to commercialize the ideas in his research.[4]: 119 The first electronic payment was sent in 1994.[21] In 1998, DigiCash filed for bankruptcy, and in 1999 Chaum sold off DigiCash and ended his involvement with the company.[10][22]
New types of digital signatures
In the same 1982 paper that proposed digital cash, Chaum introduced blind signatures.[17] This form of digital signature blinds the content of a message before it is signed, so that the signer cannot determine the content. The resulting blind signature can be publicly verified against the original, unblinded message in the manner of a regular digital signature.[23]
In 1989, he (with Hans van Antwerpen) introduced undeniable signatures.[24] This form of digital signature uses a verification process that is interactive, so that the signatory can limit who can verify the signature. Since signers may refuse to participate in the verification process, signatures are considered valid unless a signer specifically uses a disavowal protocol to prove that a given signature was not authentic.[25]
In 1991, he (with Eugene van Heyst) introduced group signatures, which allow a member of a group to anonymously sign a message on behalf of the entire group.[26] However an appointed group manager holds the power to revoke the anonymity of any signer in the case of disputes.[27]
Anonymous communication
In 1981, Chaum proposed the idea of an anonymous communication network in a paper.
In 1988, Chaum introduced a different type of anonymous communication system called a DC-Net, which is a solution to his proposed Dining Cryptographers Problem.[30] DC-Nets is the basis of the software tool Dissent.[31]
In 2017, Chaum published a description of a new variety of mix network.
Trustworthy voting systems
Chaum has made numerous contributions to secure voting systems, including the first proposal of a system that is end-to-end verifiable. This proposal, made in 1981,[28] was given as an application of mix networks. In this system, the individual ballots of voters were kept private which anyone could verify that the tally was counted correctly. This, and other early cryptographic voting systems, assumed that voters could reliably compute values with their personal computers. In 1991,[citation needed] Chaum introduced SureVote which allowed voters to cast a ballot from an untrustworthy voting system,[34] proposing a process now called "code voting" and used in remote voting systems like Remotegrity and DEMOS.[35][36]
In 1994, Chaum introduced the first in-person voting system in which voters cast ballots electronically at a polling station and cryptographically verify that the DRE did not modify their vote (or even learn what it was).[37] In the following years, Chaum proposed (often with others) a series a cryptographically verifiable voting systems that use conventional paper ballots: Prêt à Voter,[38] Punchscan,[39] and Scantegrity.[40] The city of Takoma Park, Maryland used Scantegrity for its November, 2009 election.[41] This was the first time a public sector election was run using any cryptographically verifiable voting system.[42]
In 2011, Chaum proposed Random Sample Elections.[43] This electoral system allows a verifiably random selection of voters, who can maintain their anonymity, to cast votes on behalf the entire electorate.[44]
Other contributions
In 1979, Chaum proposed a mechanism for splitting a key into partial keys, a predecessor to secret sharing.[45]
In 1985, Chaum proposed the original anonymous credential system,[19] which is sometimes also referred to as a pseudonym system.[46] This stems from the fact that the credentials of such a system are obtained from and shown to organizations using different pseudonyms which cannot be linked.
In 1988, Chaum with
1991, with Torben Pedersen, he demonstrated a well-cited zero-knowledge proof of a DDH tuple.[48] This proof is particularly useful as it can prove proper reencryption of an ElGamal ciphertext.
Chaum contributed to an important commitment scheme which is often attributed to Pedersen. In fact, Pedersen, in his 1991 paper,[49] cites a rump session talk on an unpublished paper by Jurjen Bos and Chaum for the scheme. It appeared even earlier in a paper by Chaum, Damgard, and Jeroen van de Graaf.[50]
In 1993 with Stefan Brands, Chaum introduced the concept of a distance-bounding protocol.[51]
In 2019, he was one of the speakers at the fifth Ethereum developer conference, which was held in Japan.[52]
Bibliography
- Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, 1981
- Advances in Cryptology – Proceedings of Crypto 82, 1983[53]
- Advances in Cryptology – Proceedings of Crypto 83, 1984[54]
- David Chaum, Amos Fiat and Moni Naor, Untraceable Electronic Cash[55]
- David Lee Chaum, Computer Systems Established, Maintained and Trusted by Mutually Suspicious Groups, University of California, Berkeley, 1982[7]
- David Chaum, Towards Trustworthy Elections, Springer-Verlag Berlin and Heidelberg GmbH & Co. K, 2010
- How to issue a central bank digital currency (working paper), 2021[56]
References
- ^ S2CID 53114747.)
{{cite journal}}
: CS1 maint: multiple names: authors list (link - ^ Greenberg, Andy (January 6, 2016). "The Father of Online Anonymity Has a Plan to End the Crypto War". Wired Magazine. Archived from the original on May 7, 2023. Retrieved February 8, 2022.
- ^ "Meet The Godfather Of Crypto, Who's Been Working On Digital Currency Since The Early 80s". Bloomberg News. May 27, 2019. Archived from the original on 2022-03-05. Retrieved 2022-03-05.
- ^ ISBN 0525953205.
- (PDF) from the original on 2020-09-19. Retrieved 2019-09-24.
- ISBN 9781101199466.
- ^ a b David Lee Chaum. "Computer Systems Established, Maintained and Trusted by Mutually Suspicious Groups." University of California, Berkeley, 1982. Archived 2023-05-10 at the Wayback Machine
- ^ Pitta, Julie (November 1, 1999). "Requiem for a Bright Idea". Forbes.
- ISBN 026230080X.
- ^ a b "On the Identity Trail - David Chaum: Bio". Archived from the original on 2013-12-02. Retrieved 2013-06-13.
- ^ Rotenberg, Marc (May 1, 1996). "Eurocrats Do Good Privacy". Wired Magazine. Archived from the original on March 28, 2014. Retrieved June 17, 2013.
- ^ "IACR Fellows". IACR. Archived from the original on April 24, 2018. Retrieved June 17, 2013.
- ^ "RSA Conference | RSA Conference USA 2010 | Congratulations to this year's RSA Conference 2010 Award winners!". Archived from the original on 2013-06-16. Retrieved 2013-06-13.
- ^ "David Chaum and Guido van Rossum awarded Dijkstra Fellowship". CWI. Archived from the original on 2022-12-07. Retrieved 2019-11-22.
- ^ "USI Honorary Doctorates". USI. Archived from the original on June 3, 2021. Retrieved May 16, 2021.
- ^ "E-cash inventor David Chaum on making a comeback, pre-empting bitcoin, and keeping Satoshi anonymous". finance.yahoo.com. 23 April 2019. Archived from the original on 2022-06-10. Retrieved 2019-11-02.
- ^ ISBN 978-1-4757-0604-8. Archived(PDF) from the original on 2014-12-18. Retrieved 2013-06-13.
- ^ Arvind Narayanan: What Happened to the Crypto Dream?, Part 1 Archived 2019-10-29 at the Wayback Machine. IEEE Security & Privacy. Volume 11, Issue 2, March–April 2013, pages 75-76, ISSN 1540-7993
- ^ S2CID 15340054.
- ^ Chaum, D.; Fiat, A.; Naor, M. (1990), "Untraceable electronic cash", Proceedings on Advances in Cryptology – CRYPTO '88, Lecture Notes in Computer Science, vol. 403, London, UK: Springer-Verlag, pp. 319–327
- ^ "EFF:". Archived from the original on 2015-01-07. Retrieved 2013-06-13.
- ^ Pitta, Julie (1 November 1999). "Requiem for a Bright Idea". Forbes. Archived from the original on 30 August 2017. Retrieved 8 October 2022.
- ^ "RSA Laboratories - 7.3 What is a blind signature scheme?". Archived from the original on 2012-08-26. Retrieved 2013-06-13.
- ISBN 978-0-387-97317-3.
- ^ "RSA Laboratories - 7.8 What is an undeniable signature scheme?". Archived from the original on 2012-08-20. Retrieved 2013-06-13.
- ISBN 978-3-540-54620-7. Archived(PDF) from the original on 2023-05-13. Retrieved 2023-05-13.
- ^ "RSA Laboratories - 7.6 What is a group signature?". Archived from the original on 2012-08-20. Retrieved 2013-06-13.
- ^ (PDF) from the original on 2020-09-19. Retrieved 2019-09-24.
- YouTube
- from the original on 2014-12-21. Retrieved 2013-06-13.
- ^ "Dedis@yale | Dissent: Accountable Anonymous Group Communication". Archived from the original on 2013-08-28. Retrieved 2013-06-13.
- ^ Chaum, D., Das, D., Javani, F., Kate, A., Krasnova, A., Ruiter, J.D., & Sherman, A.T. (2017). cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations. ACNS.
- from the original on 2023-05-07. Retrieved 2022-09-02.
- ^ Chaum, David (2001). "SureVote: Technical Overview. Proceedings of the Workshop on Trustworthy Elections (WOTE '01)" (PDF). Archived (PDF) from the original on 2008-10-23. Retrieved 2021-04-23.
- ^ Filip Zagorski and Richard T. Carback and David Chaum and Jeremy Clark and Aleksander Essex and Poorvi L. Vora (2013), "Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System Archived 2013-06-24 at the Wayback Machine," 11th International Conference on Applied Cryptography and Network Security (ACNS 2013).
- ^ "E2E-VIV Project | U.S. Vote Foundation". www.usvotefoundation.org. Archived from the original on 2016-09-11. Retrieved 2021-04-28.
- ^ Declan McCullagh, "High hopes for unscrambling the vote" Archived 2023-05-19 at the Wayback Machine, CNET News, October 1, 2004.
- ^
Chaum, D.; P.Y.A. Ryan; S. Schneider (2005), "A Practical Voter-Verifiable Election Scheme" (PDF), Computer Security – ESORICS 2005, Lecture Notes in Computer Science, 3679: 118–139, ISBN 978-3-540-28963-0, archived from the original(PDF) on 2012-03-14
- ^ S. Cherry, "Making Every E-Vote Count" Archived 2021-03-04 at the Wayback Machine, IEEE Spectrum, Jan 1 2007.
- ^ M. Lafsky, "Protecting Your Vote With Invisible Ink," Archived 2013-11-01 at the Wayback Machine Discover Magazine, Oct 2008.
- ^ Pilot Study of the Scantegrity II Voting System Planned for the 2009 Takoma Park City Election (PDF), archived from the original (PDF) on July 19, 2011
- ^ Hardesty, Larry (2009-11-13), "Cryptographic voting debuts", MIT news, archived from the original on 2023-05-19, retrieved 2023-05-19
- ^ "Random Sample Elections". Archived from the original on 2013-06-23. Retrieved 2013-06-28.
- ^ Joshua Davis. "How Selecting Voters Randomly Can Lead to Better Elections Archived 2023-01-06 at the Wayback Machine." Wired, 16.05.2012.
- ISBN 978-3-540-15658-1.
- S2CID 77189.
- ^ Gilles Brassard, David Chaum, and Claude Crepeau, Minimum Disclosure Proofs of Knowledge Archived 2011-09-27 at the Wayback Machine, Journal of Computer and System Sciences, vol. 37, pp. 156–189, 1988.
- ^ David Chaum and Torben P. Pedersen. 1992. Wallet Databases with Observers. In Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92), Ernest F. Brickell (Ed.). Springer-Verlag, London, UK, UK, 89-105.
- ISBN 978-3-540-55188-1.
- ISBN 978-3-540-18796-7.
- ^ Stefan Brands, David Chaum: Distance-bounding protocols (extended abstract). Proceedings Eurocrypt '93.
- YouTube
- )
- )
- ISBN 9780387971964.
- ^ "Swiss National Bank (SNB) - How to issue a central bank digital currency". www.snb.ch. Archived from the original on 2021-03-27. Retrieved 2021-03-29.
Further reading
- Chaum, D. (1984). "A New Paradigm for Individuals in the Information Age". 1984 IEEE Symposium on Security and Privacy (PDF). IEEE. p. 99. S2CID 1717835.
- Chaum, D. (1985). "Security without identification: Transaction systems to make big brother obsolete". Communications of the ACM. 28 (10): 1030–1044. from the original on 2023-05-19. Retrieved 2023-05-20.
- Chaum, D. (1992). "Achieving Electronic Privacy," Scientific American, August 1992, p. 96-101.
- Chaum, D. (1997). "David Chaum on Electronic Commerce How much do you trust Big Brother?". IEEE Internet Computing. 1 (6): 8–16. S2CID 8072432.