Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Go to cart
  1. Home
  2. Journal of Cryptology
  3. Article
How to time-stamp a digital document
Download PDF
Your content has downloaded

Similar content being viewed by others

Slider with three content items shown per slide. Use the Previous and Next buttons to navigate the slides or the slide controller buttons at the end to navigate through each slide.

A Study of Internet Time Dissemination Services and Their Capabilities: NTP as a Special Case in Time Metrology

Article25 May 2022

Gautam Kumar, Pranalee Thorat, … D. K. Aswal

Robust localization in wireless networks from corrupted signals

Article14 September 2021

Muhammad Osama, Dave Zachariah, … Petre Stoica

Multidimensional Period Recovery

Article14 February 2022

Amihood Amir, Ayelet Butman, … Dina Sokol

A Time Quanta Bit coding method

Article21 August 2018

Vladimír Šulc, Radek Kuchta, … Zdenka Kuchtová

Marked point processes in discrete time

Article16 April 2019

Karl Sigman & Ward Whitt

A general optimization framework for dynamic time warping

Article22 August 2022

Dave Deriso & Stephen Boyd

Time-Dependent Graphs: Definitions, Applications, and Algorithms

Article25 September 2019

Yishu Wang, Ye Yuan, … Guoren Wang

Decision-driven scheduling

Article19 December 2018

Jung-Eun Kim, Tarek Abdelzaher, … William Dron

Asynchronous Time-Aware Shaper for Time-Sensitive Networking

Article12 September 2022

Miklós Máté, Csaba Simon & Markosz Maliosz

Download PDF
  • Published: January 1991

How to time-stamp a digital document

  • Stuart Haber1 &
  • W. Scott Stornetta1 

Journal of Cryptology volume 3, pages 99–111 (1991)Cite this article

  • 25k Accesses

  • 515 Citations

  • 746 Altmetric

  • Metrics details

Abstract

The prospect of a world in which all text, audio, picture, and video documents are in digital form on easily modifiable media raises the issue of how to certify when a document was created or last changed. The problem is to time-stamp the data, not the medium. We propose computationally practical procedures for digital time-stamping of such documents so that it is infeasible for a user either to back-date or to forward-date his document, even with the collusion of a time-stamping service. Our procedures maintain complete privacy of the documents themselves, and require no record-keeping by the time-stamping service.

Download to read the full article text

Working on a manuscript?

Avoid the common mistakes

References

  1. J. Alter. When photographs lie. Newsweek, pp. 44–45, July 30, 1990.

  2. M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13(4): 850–864, Nov. 1984.

    Google Scholar 

  3. G. Brassard and M. Yung. One-way group actions. In Advances in Cryptology—Crypto '90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.

  4. I. Damgård. Collision-free hash functions and public-key signature schemes. In Advances in Cryptology—Eurocrypt '87, pp. 203–217. Lecture Notes in Computer Science, vol. 304, Springer-Verlag, Berlin, 1988.

    Google Scholar 

  5. I. Damgård. A design principle for hash functions. In Advances in Cryptology—Crypto '89 (ed. G. Brassard), pp. 416–427. Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990.

    Google Scholar 

  6. A. DeSantis and M. Yung. On the design of provably secure cryptographic hash functions. In Advances in Cryptology—Eurocrypt '90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.

  7. W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, 22: 644–654, Nov. 1976.

    Google Scholar 

  8. Z. Galil, S. Haber, and M. Yung. Interactive public-key cryptosystems. Submitted for publication, 1990.

  9. S. Goldwasser and S. Micali. Probabilistic encryption. J. Comput. System Sci., 28: 270–299, April 1984.

    Google Scholar 

  10. S. Goldwasser, S. Micali, and R. Rivest. A secure digital signature scheme. SIAM J. Comput., 17(2): 281–308, 1988.

    Google Scholar 

  11. A. Grundberg. Ask it no questions: The camera can lie. The New York Times, Section 2, pp. 1, 29, August 12,1990.

  12. R. Impagliazzo, L. Levin, and M. Luby. Pseudorandom generation from one-way functions. In Proc. 21st STOC, pp. 12–24. ACM, New York, 1989.

    Google Scholar 

  13. R. Impagliazzo and M. Luby. One-way functions are essential for complexity-based cryptography. In Proc. 30th FOCS, pp. 230–235. IEEE, New York, 1989.

    Google Scholar 

  14. H. M. Kanare. Writing the Laboratory Notebook, p. 117. American Chemical Society, Washington, D.C., 1985.

    Google Scholar 

  15. R. C. Merkle. Secrecy, authentication, and public-key systems. Ph.D. thesis, Stanford University, 1979.

  16. R. C. Merkle. One-way hash functions and DES. In Advances in Cryptology-3-Crypto '89 (ed. G. Brassard), pp. 428–446. Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990.

    Google Scholar 

  17. M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proc. 21st STOC, pp. 33–43. ACM, New York, 1989.

    Google Scholar 

  18. M. O. Rabin. Digitalized signatures. In Foundations of Secure Computation (ed.) R. A. DeMillo et al., pp. 155–168. Academic Press, New York, 1978.

    Google Scholar 

  19. R. Rivest. The MD4 message digest algorithm. In Advances in Cryptology—Crypto '90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.

  20. J. Rompel. One-way functions are necessary and sufficient for secure signatures. In Proc. 22nd STOC, pp. 387–394. ACM, New York, 1990.

    Google Scholar 

  21. C. Shannon. Prediction and entropy of printed English. Bell System Tech. J., 30: 50–64, 1951.

    Google Scholar 

  22. A. C. Yao. Theory and applications of trapdoor functions. In Proc. 23rd FOCS, pp. 80–91. IEEE, New York, 1982.

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Bellcore, 445 South Street, 07960-1910, Morristown, NJ, USA

    Stuart Haber & W. Scott Stornetta

Authors
  1. Stuart Haber
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. W. Scott Stornetta
    View author publications

    You can also search for this author in PubMed Google Scholar

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Haber, S., Stornetta, W.S. How to time-stamp a digital document. J. Cryptology 3, 99–111 (1991). https://doi.org/10.1007/BF00196791

Download citation

  • Received: 19 August 1990

  • Revised: 26 October 1990

  • Issue Date: January 1991

  • DOI: https://doi.org/10.1007/BF00196791

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Key words

  • Time-stamp
  • Hash
Download PDF

Working on a manuscript?

Avoid the common mistakes

Advertisement

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

52.201.224.90

Not affiliated

Springer Nature

© 2023 Springer Nature