I'm not sure what mathematics you used to prove that there are only two ways to ensure this. Perhaps the other ways just haven't been discovered yet.
emansipater has never bothered with mathematical proofs too much when it is clear his intellect is proof enough ...
If you're interested in the proof it can be accomplished by using the notion of "state". As always, assumptions and definitions are important so constrain the problem specifically to a discrete system and computable operations; and grant all participating entities access to private computation, private storage, and communication between arbitrary subsets of entities (if you're trying to duplicate mine).
Now at the point in the system where some entity
A has acquired exclusive control over a piece of information
i (that is, information in
A's private storage can be used to compute
i and no other entity or set of entities has access to information which can feasibly be used to compute
i), the entire system is in some state.
There are precisely three possibilities for the operation used to compute
i. Either the operation can be accomplished by changing only
A's state, it can be accomplished by changing only
A's state and one other entity's state (call it "
B"), or it requires a change in state for
A and at least two other entities (
A's state must change by the definition of "exclusive control").
In the first scenario, no other entities have observed the change in state, so the system fails (
A has obtained
i without being detected).
In the second scenario, entity
B can refuse to change their state and thereby prevent
A from obtaining
i, making them a trusted party.
The third scenario is by definition a p2p consensus methodology.
But like I said--seriously--don't take my word for it. Explore the issue and convince yourself by your own means. It will be eminently more effective.
As somebody else mentioned previously quantum cryptography has incredible ways of dealing with this problem.
With quantum cryptography, either physics is the trusted entity
B, or (more commonly) the consensus mechanism itself. You can get around this, but not with discrete, computable systems (my assumption above which allows for precise notions of "state", "entity", and exactly 3 types of operation). Similarly, any implementation on the basis of "trusted hardware" is simply using trusted hardware as
B, which is why it is called "trusted" in the first place.