Abstract
There is considerable support in the cryptography community for the “Cypherpunk Credo,” defined as: “Privacy through technology, not legislation.“ Much discussion to date has assumed that the U.S. government's opposition to strong cryptography, such as its key escrow proposals, is the primary obstacle to widespread use of anonymous electronic cash. For purposes of this paper, I assume that strong cryptography is legal and readily available. Even in that event, I claim that strong cryptography will be used to preserve anonymity only in a highly restricted subset of financial transactions. Furthermore, because technology often will not assure privacy, legal rules can and should play an important supplementary role in the protection of privacy in financial transactions.
Preview
Unable to display preview. Download preview PDF.
References
Ian Ayres & Robert Gertner, “Filling Gaps in Incomplete Contracts: An Economic Theory of Default Rules,” 99 Yale Law Journal 87 (1989).
Valerie Block, “ATM Cards Hit a Wall: The Next Breakthrough is Years Away, Bankers Say,” American Banker, Jan. 2, 1997.
David Chaum, “Achieving Electronic Privacy,” Scientific American, Aug. 1992, p. 96.
Equifax-Harris Mid-Decade Consumer Privacy Survey (1995).
A. Michael Froomkin, “The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution,” 143 University of Pennsylvania Law Review 709 (1995).
A. Michael Froomkin, “The Essential Role of Trusted Third Parties in Electronic Commerce,” 75 Oregon Law Review 49 (1996).
Furash & Co., Banking's Role in Tomorrow's Payments System: Ensuring a Role for Banks, A Study Prepared for the Banker's Roundtable (1994).
Michael C. Jensen & William H. Meckling, “Theory of the Firm, Managerial Behavior, Agency Costs and Ownership Structure,” 3 Journal of Financial Economics 305 (1976).
Testimony of Michael S. Karlin, U.S. House of Representatives, Committee on Banking, hearing on “The Future of Money,” Mar. 7, 1996.
Bruce Schneier, Applied Cryptography (John Wiley & Sons, 1996) (2d ed.).
Dashka Slater, “Secret Agents,” Express: The East Bay's Free Weekly, Mar. 14, 1997, p. 1.
12. Peter P. Swire, “Cyberbanking and Privacy: The Contracts Model,” www.osu.edu/unitst law/swire.htm (preliminary draft available, April 1997).
Peter P. Swire, “Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information,” www.osu.edu/units/law/Swire.htm, scheduled to be released at www.ntia.gov (1997).
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Swire, P.P. (1997). The uses and limits of financial cryptography: A law professor's perspective. In: Hirschfeld, R. (eds) Financial Cryptography. FC 1997. Lecture Notes in Computer Science, vol 1318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-63594-7_81
Download citation
DOI: https://doi.org/10.1007/3-540-63594-7_81
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63594-9
Online ISBN: 978-3-540-69607-0
eBook Packages: Springer Book Archive