Cyphernomicon Top
Cyphernomicon 16.24

Crypto Anarchy:
Escrow Agents and Reputations


  16.24.1. Escrow Agents as a way to deal with contract renegging
           - On-line clearing has the possible danger implicit in all
              trades that Alice will hand over the money, Bob will verify
              that it has cleared into hisaccount (in older terms, Bob
              would await word that his Swiss bank account has just been
              credited), and then Bob will fail to complete his end of
              the bargain. If the transaction is truly anonymous, over
              computer lines, then of course Bob just hangs up his modem
              and the connection is broken. This situation is as old as
              time, and has always involved protcols in which trust,
              repeat business, etc., are factors. Or escrow agents.
           - Long before the "key escrow" of Clipper, true escrow was
              planned. Escrow as in escrow agents. Or bonding agents.
           - Alice and Bob want to conduct a transaction. Neither trusts
              the other;
              indeed, they are unknown to each other. In steps "Esther's
              Escrow Service." She is _also utraceable_, but has
              established a digitally-signed presence and a good
              reputation for fairness. Her business is in being an escrow
              agent, like a bonding agency, not in "burning" either
              party. (The math of this is interesting: as long as the
              profits to be gained from any small set of transactions is
              less than her "reputation capital," it is in her interest
              to forego the profits from burning and be honest. It is
              also possible to arrange that Esther cannot profit from
              burning either Alice or Bob or both of them, e.g., by
              suitably encrypting the escrowed stuff.)
           - Alice can put her part of the transaction into escrow with
              Esther, Bob can do the same, and then Esther can release
              the items to the parties when conditions are met, when both
              parties agree, when adjudication of some sort occurs, etc.
              (There a dozen issues here, of course, about how disputes
              are settled, about how parties satisfy themselves that
              Esther has the items she says she has, etc.)
  16.24.2. Use of escrow services as a substute for government
           + as in underworld deals, international deals, etc.
             - "Machinery of Freedom" (Friedman), "The Enterprise of
                Law" (Benson)
           - "It is important to note in any case that the use of third-
              party escrow as a substitute for Government regulation was
              a feature of the Northern European semi-anarchies of
              Iceland and Ireland that have informed modern libertarian
              thought." [Duncan Frissell, 1994-08-30]
  16.24.3. Several people have raised the issue of someone in an
            anonymous transaction simply taking the money and not
            performing the service (or the flip side). This is where
            _intermediaries_ come into the picture, just as in the real
            worl (bonds, escrow agents, etc.).
  16.24.4. Alice and Bob wish to conduct an anonymous transaction; each
            is unknown to the other (no physical knowledge, no pseudonym
            reputation knowledge). These "mutually suspicious agents," in
            1960s- and 70s-era computer science lingo, must arrange
            methods to conduct business while not trusting the other.
  16.24.5. Various cryptographic protocols have been developed for such
            things as "bit commitment" (useful in playing poker over the
            phone, for example). I don't know of progress made at the
            granularity of anonymous transactions, though. (Though the
            cryptographic protocol building blocks at lower levels--such
            as bit commitment and blobs--will presumably be used
            eventually at higher levels, in markets.)
  16.24.6. I believe there is evidence we can shorten the cycle by
            borrowing noncryptographic protocols (heresy to purists!) and
            adapting them. Reputations, for example. And escrow agents (a
            form of reputation, in that the "value" of a bonding entity
            or escrow agent lies in reputation capital).
  16.24.7. if a single escrow agent is suspected of being untrustworthy
            (in a reputation capital sense), then can use _multiple_
            escrows
           - with various protocols, caveat emptor
           - n-out-of-m voting schemes, where n escrow agents out of m
              are required to complete a transaction
           - hard to compromise them all, especially if they have no
              idea whether they are being "legitimately bribed" or merely
              pinged by a reputation-rating service
           - Hunch: the work of Chaum, Bos, and the Pfaltzmanns on DC-
              nets may be direcly applicable here...issues of collusion,
              sets of colluders, detection of collusion, etc.


Next Page: 16.25 Predictions vs. Implications
Previous Page: 16.23 Undermining Governments--Collapse of the State

By Tim May, see README

HTML by Jonathan Rochkind