Stamp protocol что это

Обновлено: 16.05.2024

Welcome to the Stamp core, a reference implementation of the Stamp protocol.

The Stamp protocol is essentially a successor to PGP. It seeks to provide a meaningful cryptographic identity for a given person, which can be signed by either their peers or various institutions.

Stamp deviates from PGP in that any number of claims can be made by a Stamp identity, and any of them can be individually signed. For instance, an identity might claim ownership of an email address, and any person or organization might "stamp" (verify) that claim by having the owner of the identity sign a random string sent over email and return it to the verifier. Any number of claims or types of claims can be made and signed by any other participant.

The Stamp protocol defines not just methods for encryption, signing, and verification, but also for key recovery among trusted peers or institutions.

Stamp also allows an identity to point (or "forward") to other locations or distributed/decentralized systems. Your identity might be the canonical place that your followers on a decentralized social network might find you: switching servers doesn't mean you have to rebuild your network anymore, because you can update your Stamp identity to point at your new location. You can forward interested parties to websites, email address, social networks, or any custom representation of location.

The goals of this protocol are as follows:

  1. To provide a semi-permanent container for a cryptographically-verified online identity.
  2. To allow signing and verification of any number of custom pieces of information ("claims") that assert one's identity, including ones that are private and only accessible by the identity owner (and those who they choose to verify that claim).
  3. To allow the identity holder the ultimate control over their identity.
  4. To remain as distributed as possible.
  5. To be easy to use by choosing sensible defaults, providing good UX wherever possible, and being opinionated wherever needed.
  6. To define paths for recovery that advertise their risks and benefits.
  7. To act as a useful mechanism for discovery in other distributed or decentralized systems.

Instead of leaving key management best practices up to users, Stamp takes an opinionated approach and creates a hierarchy of cryptographic signing keys that each has its own specific function. This key format is as follows:

  • alpha - The alpha key is the highest key in the identity. It is responsible for creating the identity's ID, which is a static value used to reference your identity. The alpha key also signs the keys below it, ensuring that the keys cannot be tampered with outside of the approval of the holder of the alpha key.
    • policy - The policy key is used to sign recovery policies. A recovery policy is a set of conditions that allows an identity holder to regenerate their root or publish keys, provided they have the signatures from other identities called for by the policy. This mechanism allows recovering from lost or stolen keys in the case that the alpha key is inaccessible, which allows the identity to live beyond lost keys.
    • publish - This key is used to sign the identity whenever it is published to any public medium. It allows others to verify that the published identity is valid (because it is signed by a key signed by the alpha key, or recovered via the recovery system).
    • root - The root key is responsible for a number of things. First and foremost, it signs all aspects of the identity (outside of the alpha, policy, or publish keys) into a "root signature" which allows the identity to be verified as a singlar object that cannot be tampered with. The root signature also allows the signing of all the identity's subkeys, which are keys controlled by the owner of the identity that can be used for any purposes they wish.

    The identity itself consists of a keychain, a set of claims (which are pieces of identity information that others can verify and "stamp"), stamps on those claims, and a set of extra data.

    The extra data section of the identity is used for two main purposes.

    1. a "nickname" field, which can be used to give your identity a memorable name others can use to look it up. This nickname is not enforced to be unique, so it is generally used along with some portion of the identity's ID to differentiate it from other identities that have the same nickname.
    2. A set of forwards that point to other locations. This is particularly impactful for decentralized or distributed systems (email, Mastodon, Matrix, etc etc) that might use your Stamp identity as an intermediary that can be kept up to date with the most recent locations. For instance, if your Mastodon followers could follow stamp://andrew-lyon/haha-p_i4hWAgDTT/forwards/social/Mastodon and if you happen to change servers, the identity can update the forward to point at the new server and your followers won't even need to know you changed locations. This could be implemented for any decentralized or distributed system, and allows your cryptographic identity to be the canonical place to communicate with you.

    As mentioned, and identity contains a number of claims, and each of those claims can have any number of stamps on them from other identities.

    Stamps are what forms the trust network of the Stamp protocol: a stamp signifies a transfer of trust between identities, so if an identity you trust stamps another identity, some of that trust flows through to the recipient of the stamp. This enables a network of trust that can be used as the foundational layer of participation in distributed (or even centralized) systems themselves.

    StampNet will be a peer-to-peer system allowing publishing and searching of Stamp identities. The goal is to create something akin to Bittorrent where identities and the information surrounding them (such as revocations) can be accessed through some form of DHT.

    Another goal of StampNet is to avoid blockchains and the pitfalls surrounding them. Ideally, Stamp could act as a platform upon which egalitarian blockchain systems could be built on top of, rather than be a blockchain system itself. Using a non-blockchain P2P protocol also allows other systems to plug into StampNet as read-only members without having to "participate" in the parocessing of transactions, allowing quick lookups of identity information without the BS.

    КриптоПро TSP

    Общие сведения

    Полное наименование изделия: Программно-аппаратный комплекс "Службы УЦ. КриптоПро TSP".

    Сокращенное наименование изделия: ПАК "КриптоПро TSP".

    Назначение комплекса

    ПАК "КриптоПро TSP" реализует сервис службы штампов времени, функционирует по протоколу TSP (Time-Stamp Protocol).

    ПАК "КриптоПро TSP" обеспечивает использование международных рекомендаций в части построения инфраструктуры открытых ключей, с учетом применения ГОСТ 28147-89, ГОСТ Р 34.11-94, ГОСТ Р 34.10-2001, ГОСТ Р 34.10/11-2012:

    Stamp protocol что это

    Time Stamp Protocol

    Time stamp protocol (протокол штампа времени) или TSP — это криптографический протокол, позволяющий создавать доказательство факта существования электронного документа на определённый момент времени.

    «Центр штампов времени» (англ. time stamping authority , TSA ) — доверенный субъект PKI, обладающий точным и надёжным источником времени и оказывающий услуги по созданию «штампов времени».

    Результат вычисления хеш-функции от содержимого документа, на который получен «штамп времени», служит для связывания «штампа» с документом. «Центр штампов времени» не узнает содержимое документа, так как в «штамп времени» включается только результат вычисления хеш-функции от содержимого документа (сохраняется конфиденциальность документа).

    Временная метка

    Печать на письме. По центру дата, на круге — время, когда данное письмо было получено почтовым отделением.

    Временна́я метка (также метка времени или timestamp с англ. — «временна́я печать») — это последовательность символов или закодированной информации, показывающей, когда произошло определённое событие. Обычно показывает дату и время (иногда с точностью до долей секунд).

    Термин пришёл от сургучных печатей, используемых в офисах / на почте, чтобы отпечатать текущую дату (иногда и время) в подписи бумажных документов или записать, когда документ был принят. Типичные примеры метки времени — штемпель на письме.

    Немецкий штемпель, использовавшийся для отметки времени в документах с указанием текущего времени и даты, около 1960 года.

    Немецкий штемпель, использовавшийся для отметки времени в документах с указанием текущего времени и даты, около 1960 года.

    Сейчас использование термина расширилось на цифровую информацию. Например, компьютерные файлы содержат метки, показывающие, когда последний раз меняли файл; цифровые камеры добавляют временные метки к изображениям. Также временная метка употребляется в BSOD. Например:

    Временная метка используется при цифровой подписи и при журналировании событий.

    Многие источники также используют термин timestamp, имея в виду POSIX-время, количество секунд прошедшее с 00:00:00 UTC 1 января, 1970 года.

    Читайте также: