On Universal Composable Security of Time-Stamping Protocols

被引:0
|
作者
Matsuo, Toshihiko
Matsuo, Shin'ichiro
机构
来源
关键词
time-stamping protocol; universal composable security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Time-stamping protocols, which assure that a document was existed at a certain time, are applied to some useful and practical applications such as electronic patent applications and so on. There are two major time-stamping protocols, the simple protocol and the linking protocol. In the former, a time-stamp authority issues a time-stamp token that is the digital signature of the concatenated value of a hashed message and the present tune. In the latter, the time-stamp authority issues a time-stamp token that is the hash value of the concatenated value of a hashed message and the previous hash value. Although security requirements and analysis for above time-stamping protocols has been discussed, there are no strict cryptographic security notions for them, In this paper, we reconsider the security requirements for time-stamping protocols and define security notions for them, in a universally composable security sense, which was proposed by Canetti. We also show that these notions can be achieved using combinations of a secure key exchange protocol, a secure symmetric encryption scheme, and a secure digital signature scheme.
引用
收藏
页码:169 / 181
页数:13
相关论文
共 50 条
  • [41] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
  • [42] RFID Mutual Authentication Protocols with Universally Composable Security
    Su, Chunhua
    Li, Yingjiu
    Deng, Robert H.
    RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 : 35 - 49
  • [43] Time-stamping and counting of single photons using fast camera
    Nomerotski, Andrei
    2020 PHOTONICS NORTH (PN), 2020,
  • [44] Efficient relative time-stamping scheme based on the ternary link
    Igarashi, Y
    Kuwakado, H
    Tanaka, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (10) : 2552 - 2559
  • [45] Design of color-code system for time-stamping broadcast video
    Yoon, JC
    Kim, H
    Oh, S
    Sull, S
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (03) : 750 - 758
  • [46] A Blockchain-Based Long-Term Time-Stamping Scheme
    Meng, Long
    Chen, Liqun
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 3 - 24
  • [47] A cost effective solution for time-stamping electronic warfare system response
    Torres, Kevin
    2006 IEEE AUTOTESTCON, VOLS 1 AND 2, 2006, : 140 - 144
  • [48] Design of color-code system for time-stamping broadcast video
    Yoon, JC
    Kim, H
    Oh, S
    Sull, S
    ICCE: 2003 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, 2003, : 238 - 239
  • [49] Joint Clock Synchronization and Ranging: Asymmetrical Time-Stamping and Passive Listening
    Chepuri, Sundeep Prabhakar
    Rajan, Raj Thilak
    Leus, Geert
    van der Veen, Alle-Jan
    IEEE SIGNAL PROCESSING LETTERS, 2013, 20 (01) : 51 - 54
  • [50] Offline Time-Stamping Using TPM and Its Java']Java Library
    Kakei, Shohei
    Mohri, Masami
    Shiraishi, Yoshiaki
    Noguchi, Ryoji
    2012 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE 2012), 2012,