Time-stamping with binary linking schemes

  • Ahto Buldas
  • Peeter Laud
  • Helger Lipmaa
  • Jan Villemson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1462)

Abstract

We state the basic requirements for time-stamping systems applicable as the necessary support to the legal use of electronic documents. We analyze the main drawbacks of the time-stamping systems proposed to date and present a new system that meets all the stated requirements. We prove that these requirements cannot be significantly tightened.

References

  1. [BAN89]
    Michael Burrows, Martín Abadi, and Roger Needham. A Logic of Authentication. SRC Research Reports 39, DEC's System Research Center, February 1989.Google Scholar
  2. [BdM91]
    Josh Benaloh and Michael de Mare. Efficient Broadcast time-stamping. Technical Report 1, Clarkson University Department of Mathematics and Computer Science, August 1991.Google Scholar
  3. [BHS92]
    Dave Bayer, Stuart Haber, and W. Scott Stornetta. Improving the efficiency and reliability of digital time-stamping. In Sequences'91: Methods in Communication, Security, and Computer Science, pages 329–334. Springer-Verlag, 1992.Google Scholar
  4. [Haw88]
    Stephen W. Hawking. A Brief History of Time: From the Big Bang to Black Holes. Bantam Books, April 1988.Google Scholar
  5. [HS91]
    Stuart Haber and W.-Scott Stornetta. How to Time-Stamp a Digital Document. Journal of Cryptology, 3(2):99–111, 1991.CrossRefGoogle Scholar
  6. [HS97]
    Stuart Haber and W.-Scott Stornetta. Secure Names for Bit-Strings. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 28–35, April 1997.Google Scholar
  7. [Jus98]
    Mike Just. Some Timestamping Protocol Failures. In Internet Society Symposium on Network and Distributed System Security, 1998. Available at http://www.ses.carleton.ca/~just/.Google Scholar
  8. [MOV96]
    Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.Google Scholar
  9. [MQ97]
    Henry Massias and Jean Jacques Quisquater. Time and Cryptography. Technical report, Université catholique de Louvain, March 1997. TIMESEC Technical Report WP1.Google Scholar

Copyright information

© Springer-Verlag 1998

Authors and Affiliations

  • Ahto Buldas
    • 1
  • Peeter Laud
    • 2
  • Helger Lipmaa
    • 1
  • Jan Villemson
    • 2
  1. 1.CyberneticaTallinnEstonia
  2. 2.Tartu LabCyberneticaTartuEstonia

Personalised recommendations