A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Integrating XML Linked Time-Stamps in OASIS Digital Signature Services
[chapter]
2005
Lecture Notes in Computer Science
Linked time-stamps have an advantage over these simple time-stamps because they construct a verifiable link between time-stamps. ...
We highlight the problem points when introducing a sub-profile of this standard, and we describe some additional structures that are needed to accommodate a broad range of linked time-stamping schemes. ...
For most linking schemes, the extension to the PV should include the completion of an (incomplete) time-stamp. ...
doi:10.1007/11552055_40
fatcat:dks4czggy5a6xc22zutbp3laue
How to time-stamp a digital document
1991
Journal of Cryptology
We propose computationally practical procedures for digital time-stamping of such documents so that it is infeasible for a user either to back-date or to forward-date his document, even with the collusion ...
of a time-stamping service. ...
It is worth remarking that the time-constraining properties of the linking scheme do not depend on the use of digital signatures. ...
doi:10.1007/bf00196791
fatcat:4gmrdysy3rbw3nict4ronaeuci
Towards an XML format for time-stamps
2002
Proceedings of the 2002 ACM workshop on XML security - XMLSEC '02
In recent work by ETSI on XML digital signatures conforming to European legislation, time-stamps play a key role for qualified digital signatures. ...
Some ASN.1-based formats for time-stamp protocols have been defined within IETF and ISO/IEC. ...
ACKNOWLEDGEMENTS The authors would like to thank the anonymous referees for their useful comments and suggestions. ...
doi:10.1145/764792.764802
dblp:conf/xmlsec/WoutersPFR02
fatcat:u6izo5kuyvdmlf55dlc6zp7vcu
Towards an XML format for time-stamps
2002
Proceedings of the 2002 ACM workshop on XML security -
In recent work by ETSI on XML digital signatures conforming to European legislation, time-stamps play a key role for qualified digital signatures. ...
Some ASN.1-based formats for time-stamp protocols have been defined within IETF and ISO/IEC. ...
ACKNOWLEDGEMENTS The authors would like to thank the anonymous referees for their useful comments and suggestions. ...
doi:10.1145/764800.764802
fatcat:mnxyvfk445g2rckrvxl6f6ztlu
Improving the Efficiency and Reliability of Digital Time-Stamping
[chapter]
1993
Sequences II
Haber and Stornetta have proposed two schemes for digital time-stamping which rely on these principles [HaSt 91]. ...
We reexamine one of those protocols, addressing the resource constraint required for storage and verification of time-stamp certificates. ...
This can be applied to digital signatures, or to time-stamping itself, making the digital time-stamping process renewable. ...
doi:10.1007/978-1-4613-9323-8_24
fatcat:jkpnql4hvvfw3jafilhpf4t6jy
Improving the Availability of Time-Stamping Services
[chapter]
2001
Lecture Notes in Computer Science
We discuss the availability questions that arise when digital time stamps are used for preserving the evidentiary value of electronic documents. ...
We introduce fault-tolerant linking as a new concept to neutralize fault-sensitivity as the main weakness of linkage-based time-stamping. ...
Usage example: Time stamps for digital signatures Time-stamping of digital signature begins with obtaining a freshness token from the TSA. ...
doi:10.1007/3-540-47719-5_29
fatcat:wb276sgqjvhwzc3c24l3lf4dse
Analysis of Client-side Security for Long-term Time-stamping Services
2021
Zenodo
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at given points in time. ...
After the algorithms are compromised, time-stamp tokens using the algorithms are no longer trusted. The ANSI and ISO/IEC standards provide renewal mechanisms for time-stamp tokens. ...
However, for many types of digital data, the validity of time-stamp tokens need to be maintained for a long time. ...
doi:10.5281/zenodo.5546768
fatcat:syluuxkbcfdvhp5d4cnxdcfg4u
On the design of time-stamped signatures
2004
Journal of computer and system sciences (Print)
Based on relative temporal authentication, several linking schemes for digital time-stamping have been proposed to solve this problem. ...
It is natural that the time-stamped signature schemes based on absolute temporal authentication suffer from the weakness when the signer colludes with the Time-Stamping Service. ...
In Section 2, we briefly introduce those linking schemes with RTA for digital time-stamping. ...
doi:10.1016/j.jcss.2003.10.003
fatcat:6wxr4leelratvch6cwuhqx6dju
Secure time-stamping schemes: a distributed point of view
2006
Annales des télécommunications
Liardet is with LATP, Time-stamping is a technique used to prove the existence of a digital document prior to a specific point in time. ...
This scheme appears to be a trusted and reliable distributed time-stamping scheme. ...
Acknowledgement The authors are grateful to the referees for their useful comments. ...
doi:10.1007/bf03219928
fatcat:bfnqp3tsp5ezbhac3nr22n7gju
Time-stamping with binary linking schemes
[chapter]
1998
Lecture Notes in Computer Science
We state the basic requirements for time-stamping systems applicable as the necessary support to the legal use of electronic documents. ...
We analyze the main drawbacks of the time-stamping systems proposed to date and present a new system that meets all the stated requirements. ...
The reasoning about the time-stamping procedures creates the need for a formal apparatus capable to prove the security of time-stamping protocols, in a way similar to how the BAN-style logics [BAN89] are ...
doi:10.1007/bfb0055749
fatcat:poxt2pah6fcb5i26kg6o2arz7q
A time stamped signature scheme based on elliptic curve
2021
Malaya Journal of Matematik
We propose a time-stamped signature scheme based on elliptic curve. ...
The signature consists of an authenticated time-stamp provided by a trusted authority, known as Time-Stamping System, which provides time-stamp without having any knowledge of the content of the document ...
Acknowledgment The authors express their gratitude towards different anonymous reviewer for their comments & suggestions towards this work. ...
doi:10.26637/mjm0901/0095
fatcat:rt4faj5wyvfobjpbup2wdi5qni
Secure Digital Chains of Evidence
2011
2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering
Finally, possible building blocks are explored for the realisation of a distributed and heterogeneous system with support for secure digital chains of evidence. ...
For applications where critical processes can lead to disputes and resolving disputed relies on digital evidence one open question is how to build the system in a way that secure digital evidence is available ...
A feasible approach is to introduce a certified monotonic and timed tick-counter and a mechanism for digital signatures and secure key storage to provide for time-stamps. ...
doi:10.1109/sadfe.2011.16
dblp:conf/sadfe/KuntzeR11
fatcat:6wyqizxe45hhlmxiilyph7kduu
Development of Mechanism of Integrity in M-Commerce Using Joint Signature Scheme
2012
Journal of clean energy technologies
Different hash functions and time stamping is used for providing integrity of data. The result obtained by this research shows that integrity issue is resolved in mobile commerce domain. ...
Message as well as time stamp is send through trusted third party from sender to receiver. ...
His proposed scheme uses International Data Encryption Algorithm-Range Scaling Algorithm (IDEA-RSA) for encrypting message and RSA digital signature is used for getting digital signatures. ...
doi:10.7763/ijcte.2012.v4.477
fatcat:zgziw7n2qnax3bhc5hronwslda
Verifiable Distribution of Material Goods Based on Cryptology
2015
Acta Informatica Pragensia
Extension consisting of adding digital signatures to revenue stamps used for state-controlled goods is also presented. ...
In this paper an architecture for verifiable distribution of material goods is presented. ...
Especially, usage of a cryptographically signed revenue stamp embodied in a product would be very secure. ...
doi:10.18267/j.aip.76
fatcat:fi5xoif6nbb73gnbznfjhl33lu
Techniques to audit and certify the long-term integrity of digital archives
2009
International Journal on Digital Libraries
time period. ...
Moreover, an independent auditor will be able to verify the integrity of every version of an archived digital object as well as link the current version to the original form of the object when it was ingested ...
A time stamp of a digital object D at time T is a record that can be used any time in the future (later than T) to verify that D existed at time T. ...
doi:10.1007/s00799-009-0056-2
fatcat:j76luxr4cjgmfpnmkcujf6jynu
« Previous
Showing results 1 — 15 out of 20,108 results