Abstract
Time-Stamping is a cryptographic technique which allows us to prove that an electronic document existed at a certain point in time and that it has not been modified since then. Different time-stamping schemes have already been proposed. Most of them use the concept of trusted Time-Stamping Authority (TSA). A TSA is in charge of time-stamping documents and delivering a time-stamping certificate for each time-stamped document. The purpose of this paper is to propose a new time-stamping scheme using a Local Time-stamping System (LTS). The main idea can be summarised as follows: digests of the documents to be time-stamped are sent to a Local Time-stamping System (LTS). The LTS accumulates the digests into a round value using a round-based protocol. The round value is then time-stamped by a trusted and official TSA. We show how this time-stamping scheme could be useful for an organisation such as a digital library or a company.
Chapter PDF
Similar content being viewed by others
Key words
References
C. Adams, P. Cain, D. Pinkas, R. Zuccherato. Internet X.509 Public Key Infrastructure Time Stamp Protocol. Draft IETF. January 2001.
A. Arsenault and S. Turner. Internet Public Key Infrastructure PKIX roadmap. Draft 04, IETF, October 1999.
D. Bayer S. Haber and W. Stornetta. Improving the efficiency and reliability of digital time-stamping. In Springer Verlag editor. Sequences’ 91: Methods in Communication, Security and Computer Science, pages 329–334, 1992.
Ahto Buldas, Helger Lipmaa, Berry Schoenmakers. Optimally Efficient Accountable Time-Stamping. Public Key Cryptography’ 2000, volume 1751 of Lecture Notes in Computer Science, pages 293–305, Melbourne, Australia, 18–20 January 2000. Springer Verlag.
Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Willemson. Time-Stamping with Binary Linking Schemes. Advances in Cryptology — CRYPTO’ 98, volume 1462 of Lecture Notes in Computer Science, pages 486–501. Springer-Verlag, 1998.
J. Benaloh and M. de Mare. One-way accumulator: A decentralized alternative to digital signatures. In Tor Helleseth, editor. Advances in Cryptology. Proceedings of Eurocrypt’93, number 765, pages 274–285. Springer-Verlag, 1994.
C. Ellison and B. Schneier. Ten Risks of PKI: What you are not being told about PKI. Computer Security Journal. Vol XVI, Number 1, 2000.
S. Haber and W. Stornetta. How to timestamp a digital document. Journal of Cryptology, vol 3(2), pages 99–112, 1991.
A. Menezes, P. Oorschot and S. Vanstone. Handbook of Applied Cryptography, CRC Press, 1997.
H. Massias, J.J. Quisquater. Time and Cryptography. Technical report, TIMESEC project, 1997.
B. Preneel, B. Van Rompay, J.J. Quisquater, H. Massias, J. Serret Avila. Design of a timestamping system. Technical report, TIMESEC project, 1998.
J.J. Quisquater, H. Massias, J. Serret Avila, B. Preneel, B. Van Rompay. Specification and Implementation of a timestamping system. Technical report, TIMESEC project, 1999.
R. Rivest, A. Shamir, L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, pages 120–126. 1978
Tomas Sander. Efficient Accumulators without Trapdoor. In the second International Conference on Information and Communication Security, Sydney, Australia, 9–11 November 1999.
Surety Technology. http://www.surety.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this paper
Cite this paper
Gabillon, A., Byun, J. (2001). A Two-level Time-Stamping System. In: Dupuy, M., Paradinas, P. (eds) Trusted Information. SEC 2001. IFIP International Federation for Information Processing, vol 65. Springer, Boston, MA. https://doi.org/10.1007/0-306-46998-7_10
Download citation
DOI: https://doi.org/10.1007/0-306-46998-7_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7389-6
Online ISBN: 978-0-306-46998-5
eBook Packages: Springer Book Archive