Integrating XML Linked Time-Stamps in OASIS Digital Signature Services

  • Ana Isabel González-Tablas
  • Karel Wouters
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3677)


The technique of electronic time-stamping allows a client to get an electronic proof of the existence of a document at a speci.c point in time. A simple way to achieve this is to produce a digital signature over the pair (document,time). Linked time-stamps have an advantage over these simple time-stamps because they construct a link between time-stamps. In this paper, we discuss how to include linked time-stamps in the OASIS Digital Signature Services standard. We highlight the problem points when introducing a sub-pro.le of this standard, and we describe some additional structures that are needed to accommodate a broad range of linked time-stamping schemes.


Linked time-stamping Digital Signature Services XML security 


  1. 1.
    ISO/IEC 18014-1. Information technology – Security techniques – Time-stamping services – Part 1: Framework (2002)Google Scholar
  2. 2.
    ISO/IEC 18014-2. Information technology – Security techniques – Time-stamping services – Part 2: Mechanisms producing independent tokens (2003)Google Scholar
  3. 3.
    Adams, C., Cain, P., Pinkas, D., Zuccherato, R.: Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) (April 2002),
  4. 4.
    Bayer, D., Haber, S., Scott Stornetta, W.: Improving the Efficiency and Reliability of Digital Time-Stamping. In: Sequences II: Methods in Communication, Security and Computer Science, pp. 329–334. Springer, Heidelberg (1993)CrossRefGoogle Scholar
  5. 5.
    Benaloh, J., de Mare, M.: One-way Accumulators: A Decentralized Alternative to Digital Signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274–285. Springer, Heidelberg (1994)CrossRefGoogle Scholar
  6. 6.
    Buldas, A., Lipmaa, H., Schoenmakers, B.: Optimally Efficient Accountable Time-Stamping. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 293–305. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  7. 7.
    Eastlake, D., Reagle, J., Solo, D.: XML-Signature Syntax and Processing (February 2002),
  8. 8.
    Perrin, T., et al.: OASIS Digital Signature Services TC. Digital Signature Service (DSS) Core Protocols, Elements and Bindings, Working Draft 26 (June 2004),
  9. 9.
    Perrin, T., et al.: OASIS Digital Signature Services TC. XML Timestamping DSS Profile, Working Draft 06 (June 2004),
  10. 10.
    European Committee for Standardization CEN. CWA 14171: Procedures for Electronic Signature Verification (2001),
  11. 11.
    Housley, R.: Cryptographic Message Syntax (April 2002),
  12. 12.
    Merkle, R.C.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 122–134 (1980)Google Scholar
  13. 13.
    Surety. Surety AbsoluteProof Solution Suite,
  14. 14.
    Wang, X., Feng, D., Lai, X., Yu, H.: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. In: Rump session of CRYPTO 2004 (August 2004), available at
  15. 15.
    Wouters, K., Preneel, B., González-Tablas, A.I., Ribagorda, A.: Towards an XML Format for Time-Stamps. In: ACM Workshop on XML Security 2002. ACM, New York (2002)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • Ana Isabel González-Tablas
    • 1
  • Karel Wouters
    • 2
  1. 1.Computer Science Department – SeTICarlos III University (Madrid)Spain
  2. 2.Department Electrical Engineering – ESAT, CosicKatholieke Universiteit LeuvenBelgium

Personalised recommendations