On Universal Composable Security of Time-Stamping Protocols

被引:0
|
作者
Matsuo, Toshihiko
Matsuo, Shin'ichiro
机构
来源
关键词
time-stamping protocol; universal composable security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Time-stamping protocols, which assure that a document was existed at a certain time, are applied to some useful and practical applications such as electronic patent applications and so on. There are two major time-stamping protocols, the simple protocol and the linking protocol. In the former, a time-stamp authority issues a time-stamp token that is the digital signature of the concatenated value of a hashed message and the present tune. In the latter, the time-stamp authority issues a time-stamp token that is the hash value of the concatenated value of a hashed message and the previous hash value. Although security requirements and analysis for above time-stamping protocols has been discussed, there are no strict cryptographic security notions for them, In this paper, we reconsider the security requirements for time-stamping protocols and define security notions for them, in a universally composable security sense, which was proposed by Canetti. We also show that these notions can be achieved using combinations of a secure key exchange protocol, a secure symmetric encryption scheme, and a secure digital signature scheme.
引用
收藏
页码:169 / 181
页数:13
相关论文
共 50 条
  • [21] Evaluation of Synchronization Protocols for fine-grain HPC sensor data time-stamping and collection
    Libri, Antonio
    Bartolini, Andrea
    Magno, Michele
    Benini, Luca
    2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 818 - 825
  • [22] ENF Based Robust Media Time-Stamping
    Vatansever, Saffet
    Dirik, Ahmet Emir
    Memon, Nasir
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1963 - 1967
  • [23] TimepixCam: a fast optical imager with time-stamping
    Fisher-Levine, M.
    Nomerotski, A.
    JOURNAL OF INSTRUMENTATION, 2016, 11
  • [24] A two-level time-stamping system
    Gabillon, A
    Byun, J
    TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 139 - 149
  • [25] Time-stamping algorithms for parallelization of loops at run-time
    Xu, CZ
    Chaudhary, V
    11TH INTERNATIONAL PARALLEL PROCESSING SYMPOSIUM, PROCEEDINGS, 1997, : 443 - 450
  • [26] On optimal hash tree traversal for interval time-stamping
    Lipmaa, H
    INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 357 - 371
  • [27] Knowledge-binding commitments with applications in time-stamping
    Buldas, Ahto
    Laur, Sven
    PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 2007, 4450 : 150 - +
  • [28] Bounded time-stamping in message-passing systems
    Mukund, M
    Kumar, KN
    Sohoni, M
    THEORETICAL COMPUTER SCIENCE, 2003, 290 (01) : 221 - 239
  • [29] Secure time-stamping schemes: a distributed point of view
    Bonnecaze, Alexis
    Liardet, Pierre
    Gabillow, Alban
    Blibech, Kaouther
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2006, 61 (5-6): : 662 - 681
  • [30] Optimal higher-order encoder time-stamping
    Merry, R. J. E.
    van de Molengraft, M. J. G.
    Steinbuch, M.
    MECHATRONICS, 2013, 23 (05) : 481 - 490