Hostname: page-component-89b8bd64d-mmrw7 Total loading time: 0 Render date: 2026-05-07T18:09:35.176Z Has data issue: false hasContentIssue false

Authentication Studies (辨偽學) Methodology and the Polymorphous Text Paradigm

Published online by Cambridge University Press:  08 August 2014

Abstract

The foundation of Chinese intellectual history is a group of texts known as “masters texts” (子書). Many masters texts were authored in the Han dynasty or earlier and many of these have as their title the name of a master who was generally regarded as the author. The inclination to treat a given book as the product of a single writer is apparently a strong one. Nevertheless, from the very beginning there were Chinese scholars who doubted the veracity of the putative authorship of some of these works and suggested that they may in fact have been the product of several authors. Over time, such scholars developed criteria by which to judge the authenticity of ancient masters texts. But as such textual criticism grew more penetrating, the object of its scrutiny began to come apart at the seams. In the last two decades there has been a growing consensus that most early Chinese masters texts were originally quite permeable and that only later were their received forms settled upon.

The branch of textual criticism that deals with authenticating early Chinese texts is called “Authentication studies.” This paper is a survey of the methodological advances made in the field of Authentication studies over the last two millennia. It is not a history of the field, as such a history would be a much longer project. The survey concludes with the idea of the “polymorphous text paradigm,” a paradigm that paradoxically obviates much of the preceding scholarship in its own field. Simply put, if authentication relies largely on anachronism, and anachronism relies largely on the dates of the putative author, then a multi-author work with no known “last author” will be impossible to authenticate. Furthermore, the polymorphous text paradigm does not posit these texts as necessarily having earlier and later “layers,” but rather as having had no set structure over the course of their early redactional evolution.

This survey examines the contributions of seventeen scholars to Authentication studies methodology, and concludes with how the changes in this field have influenced the work of three modern, Western scholars.

諸子書是研究中國思想史的基礎。其中許多書成於漢代及其前代的, 而這些書往往以被視為書的作者之名為書名。人們也傾向將某一部子 書視為單一作者所著。儘管如此,很早就有中國學者對上述推定作者 的觀點表示懷疑,而他們就提出多數子書其實是由許多作者所共同完 成的。隨著時間過去,這些持懷疑論的學者發展並形成了一套判斷古 書真偽的標準。但是,這種文獻學的驗證越是敏銳,它所檢視對象的 可信度也就開始分崩離析。在最近二十年,有一種日益為人接受的看 法,即認為早期中國的子書原具有較大的滲透性,到後來才漸漸形成 固定的文本形式。

文獻學中處理古書真偽問題的學科稱之為 “辨偽學”。本文檢視兩千 年來辨偽學方法的進展,用意不是要計劃寫一部辨偽學史,後者需要 更長遠的研究才能完成。文章以 “多形文獻範式” 作為總結,這種範式 似是而非推翻了存在其前的辨偽論點。簡而言之,如果判定文獻真偽 的主要根據是時代的錯置,而著作時代錯置的推論又依據於所假定的 作者所處的年代,則一部多人創作而無法確知其 “最後作者” 的著作將 無從判定其真偽。此外,本文所舉出的 “多形文獻範式” 並不假定這些 文獻必有先後層次,而是認定其在早期傳抄過程中有無固定結構的樣 貌。

本文評述了歷來十七位學者對辨偽學方法的貢獻,最後也提及此一 領域的變遷如何影響了三位現代西方學者的研究工作。

Information

Type
Articles
Copyright
Copyright © Society for the Study of Early China 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Article purchase

Temporarily unavailable