Filters








20,108 Hits in 9.6 sec

Integrating XML Linked Time-Stamps in OASIS Digital Signature Services [chapter]

Ana Isabel González-Tablas, Karel Wouters
2005 Lecture Notes in Computer Science  
Linked time-stamps have an advantage over these simple time-stamps because they construct a verifiable link between time-stamps.  ...  We highlight the problem points when introducing a sub-profile of this standard, and we describe some additional structures that are needed to accommodate a broad range of linked time-stamping schemes.  ...  For most linking schemes, the extension to the PV should include the completion of an (incomplete) time-stamp.  ... 
doi:10.1007/11552055_40 fatcat:dks4czggy5a6xc22zutbp3laue

How to time-stamp a digital document

Stuart Haber, W.Scott Stornetta
1991 Journal of Cryptology  
We propose computationally practical procedures for digital time-stamping of such documents so that it is infeasible for a user either to back-date or to forward-date his document, even with the collusion  ...  of a time-stamping service.  ...  It is worth remarking that the time-constraining properties of the linking scheme do not depend on the use of digital signatures.  ... 
doi:10.1007/bf00196791 fatcat:4gmrdysy3rbw3nict4ronaeuci

Towards an XML format for time-stamps

Karel Wouters, Bart Preneel, Ana Isabel González-Tablas, Arturo Ribagorda
2002 Proceedings of the 2002 ACM workshop on XML security - XMLSEC '02  
In recent work by ETSI on XML digital signatures conforming to European legislation, time-stamps play a key role for qualified digital signatures.  ...  Some ASN.1-based formats for time-stamp protocols have been defined within IETF and ISO/IEC.  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous referees for their useful comments and suggestions.  ... 
doi:10.1145/764792.764802 dblp:conf/xmlsec/WoutersPFR02 fatcat:u6izo5kuyvdmlf55dlc6zp7vcu

Towards an XML format for time-stamps

Karel Wouters, Bart Preneel, Ana Isabel González-Tablas, Arturo Ribagorda
2002 Proceedings of the 2002 ACM workshop on XML security -  
In recent work by ETSI on XML digital signatures conforming to European legislation, time-stamps play a key role for qualified digital signatures.  ...  Some ASN.1-based formats for time-stamp protocols have been defined within IETF and ISO/IEC.  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous referees for their useful comments and suggestions.  ... 
doi:10.1145/764800.764802 fatcat:mnxyvfk445g2rckrvxl6f6ztlu

Improving the Efficiency and Reliability of Digital Time-Stamping [chapter]

Dave Bayer, Stuart Haber, W. Scott Stornetta
1993 Sequences II  
Haber and Stornetta have proposed two schemes for digital time-stamping which rely on these principles [HaSt 91].  ...  We reexamine one of those protocols, addressing the resource constraint required for storage and verification of time-stamp certificates.  ...  This can be applied to digital signatures, or to time-stamping itself, making the digital time-stamping process renewable.  ... 
doi:10.1007/978-1-4613-9323-8_24 fatcat:jkpnql4hvvfw3jafilhpf4t6jy

Improving the Availability of Time-Stamping Services [chapter]

Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson
2001 Lecture Notes in Computer Science  
We discuss the availability questions that arise when digital time stamps are used for preserving the evidentiary value of electronic documents.  ...  We introduce fault-tolerant linking as a new concept to neutralize fault-sensitivity as the main weakness of linkage-based time-stamping.  ...  Usage example: Time stamps for digital signatures Time-stamping of digital signature begins with obtaining a freshness token from the TSA.  ... 
doi:10.1007/3-540-47719-5_29 fatcat:wb276sgqjvhwzc3c24l3lf4dse

Analysis of Client-side Security for Long-term Time-stamping Services

Long Meng, Liqun Chen
2021 Zenodo  
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at given points in time.  ...  After the algorithms are compromised, time-stamp tokens using the algorithms are no longer trusted. The ANSI and ISO/IEC standards provide renewal mechanisms for time-stamp tokens.  ...  However, for many types of digital data, the validity of time-stamp tokens need to be maintained for a long time.  ... 
doi:10.5281/zenodo.5546768 fatcat:syluuxkbcfdvhp5d4cnxdcfg4u

On the design of time-stamped signatures

Hung-Min Sun, Bing-Chang Chen, Her-Tyan Yeh
2004 Journal of computer and system sciences (Print)  
Based on relative temporal authentication, several linking schemes for digital time-stamping have been proposed to solve this problem.  ...  It is natural that the time-stamped signature schemes based on absolute temporal authentication suffer from the weakness when the signer colludes with the Time-Stamping Service.  ...  In Section 2, we briefly introduce those linking schemes with RTA for digital time-stamping.  ... 
doi:10.1016/j.jcss.2003.10.003 fatcat:6wxr4leelratvch6cwuhqx6dju

Secure time-stamping schemes: a distributed point of view

Alexis Bonnecaze, Pierre Liardet, Alban Gabillon, Kaouther Blibech
2006 Annales des télécommunications  
Liardet is with LATP, Time-stamping is a technique used to prove the existence of a digital document prior to a specific point in time.  ...  This scheme appears to be a trusted and reliable distributed time-stamping scheme.  ...  Acknowledgement The authors are grateful to the referees for their useful comments.  ... 
doi:10.1007/bf03219928 fatcat:bfnqp3tsp5ezbhac3nr22n7gju

Time-stamping with binary linking schemes [chapter]

Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson
1998 Lecture Notes in Computer Science  
We state the basic requirements for time-stamping systems applicable as the necessary support to the legal use of electronic documents.  ...  We analyze the main drawbacks of the time-stamping systems proposed to date and present a new system that meets all the stated requirements.  ...  The reasoning about the time-stamping procedures creates the need for a formal apparatus capable to prove the security of time-stamping protocols, in a way similar to how the BAN-style logics [BAN89] are  ... 
doi:10.1007/bfb0055749 fatcat:poxt2pah6fcb5i26kg6o2arz7q

A time stamped signature scheme based on elliptic curve

Manoj Kumar Chande, Swati Jain
2021 Malaya Journal of Matematik  
We propose a time-stamped signature scheme based on elliptic curve.  ...  The signature consists of an authenticated time-stamp provided by a trusted authority, known as Time-Stamping System, which provides time-stamp without having any knowledge of the content of the document  ...  Acknowledgment The authors express their gratitude towards different anonymous reviewer for their comments & suggestions towards this work.  ... 
doi:10.26637/mjm0901/0095 fatcat:rt4faj5wyvfobjpbup2wdi5qni

Secure Digital Chains of Evidence

Nicolai Kuntze, Carsten Rudolph
2011 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering  
Finally, possible building blocks are explored for the realisation of a distributed and heterogeneous system with support for secure digital chains of evidence.  ...  For applications where critical processes can lead to disputes and resolving disputed relies on digital evidence one open question is how to build the system in a way that secure digital evidence is available  ...  A feasible approach is to introduce a certified monotonic and timed tick-counter and a mechanism for digital signatures and secure key storage to provide for time-stamps.  ... 
doi:10.1109/sadfe.2011.16 dblp:conf/sadfe/KuntzeR11 fatcat:6wyqizxe45hhlmxiilyph7kduu

Development of Mechanism of Integrity in M-Commerce Using Joint Signature Scheme

Sobia Shafiq, Malik Sikandar Hayat Khiyal, Aihab Khan
2012 Journal of clean energy technologies  
Different hash functions and time stamping is used for providing integrity of data. The result obtained by this research shows that integrity issue is resolved in mobile commerce domain.  ...  Message as well as time stamp is send through trusted third party from sender to receiver.  ...  His proposed scheme uses International Data Encryption Algorithm-Range Scaling Algorithm (IDEA-RSA) for encrypting message and RSA digital signature is used for getting digital signatures.  ... 
doi:10.7763/ijcte.2012.v4.477 fatcat:zgziw7n2qnax3bhc5hronwslda

Verifiable Distribution of Material Goods Based on Cryptology

Radomír Palovský
2015 Acta Informatica Pragensia  
Extension consisting of adding digital signatures to revenue stamps used for state-controlled goods is also presented.  ...  In this paper an architecture for verifiable distribution of material goods is presented.  ...  Especially, usage of a cryptographically signed revenue stamp embodied in a product would be very secure.  ... 
doi:10.18267/j.aip.76 fatcat:fi5xoif6nbb73gnbznfjhl33lu

Techniques to audit and certify the long-term integrity of digital archives

Sangchul Song, Joseph JaJa
2009 International Journal on Digital Libraries  
time period.  ...  Moreover, an independent auditor will be able to verify the integrity of every version of an archived digital object as well as link the current version to the original form of the object when it was ingested  ...  A time stamp of a digital object D at time T is a record that can be used any time in the future (later than T) to verify that D existed at time T.  ... 
doi:10.1007/s00799-009-0056-2 fatcat:j76luxr4cjgmfpnmkcujf6jynu
« Previous Showing results 1 — 15 out of 20,108 results