On Universal Composable Security of Time-Stamping Protocols

被引:0
|
作者
Matsuo, Toshihiko
Matsuo, Shin'ichiro
机构
来源
关键词
time-stamping protocol; universal composable security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Time-stamping protocols, which assure that a document was existed at a certain time, are applied to some useful and practical applications such as electronic patent applications and so on. There are two major time-stamping protocols, the simple protocol and the linking protocol. In the former, a time-stamp authority issues a time-stamp token that is the digital signature of the concatenated value of a hashed message and the present tune. In the latter, the time-stamp authority issues a time-stamp token that is the hash value of the concatenated value of a hashed message and the previous hash value. Although security requirements and analysis for above time-stamping protocols has been discussed, there are no strict cryptographic security notions for them, In this paper, we reconsider the security requirements for time-stamping protocols and define security notions for them, in a universally composable security sense, which was proposed by Canetti. We also show that these notions can be achieved using combinations of a secure key exchange protocol, a secure symmetric encryption scheme, and a secure digital signature scheme.
引用
收藏
页码:169 / 181
页数:13
相关论文
共 50 条
  • [1] Universally composable time-stamping schemes with audit
    Buldas, A
    Laud, P
    Saarepera, M
    Willemson, J
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 359 - 373
  • [2] Study on the Security of Time-Stamping Service Architecture
    Guo Wei
    Hua Yu
    Song Ke Xin
    ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 28 - +
  • [4] Bounded concurrent time-stamping
    Dolev, D
    Shavit, N
    SIAM JOURNAL ON COMPUTING, 1997, 26 (02) : 418 - 455
  • [5] Time-Stamping Authority Grid
    Nishikawa, T.
    Matsuoka, S.
    CCGRID 2008: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, VOLS 1 AND 2, PROCEEDINGS, 2008, : 98 - 105
  • [6] THE NEED FOR DIGITAL TIME-STAMPING
    HABER, S
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1993, 206 : 46 - CINF
  • [7] Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping
    Buldas, Ahto
    Niitsoo, Margus
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 318 - 335
  • [8] A survey of the problems of time-stamping or why it is necessary to have another time-stamping scheme
    Marinescu, Cristian
    Tapus, Nicolae
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2007, : 341 - +
  • [9] Do broken hash functions affect the security of time-stamping schemes?
    Buldas, Ahto
    Laur, Sven
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 50 - 65
  • [10] Measure frequency with time-stamping counters
    Johansson, Staffan
    MICROWAVES & RF, 2006, 45 (05) : 115 - +