Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
Optimally Efficient Accountable Time-Stamping
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Towards an XML format for time-stamps
Proceedings of the 2002 ACM workshop on XML security
On Universal Composable Security of Time-Stamping Protocols
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Some critical aspects of the PKIX TSP
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Design requirements for a secure time-stamping scheme
EuroIMSA '08 Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications
Hi-index | 0.00 |
One of the most important problems users of digital signatures are facing is establishing the exact moment the signature was created. Because many non-repudiation and authentication services require this capacity, it is very important to deliver trustworthy and secure time-stamping services. But what is the real importance of time-stamping? Is it possible to deliver secure time-stamp services based on the protocols known today? If not, what other protocols are needed to achieve this task? This paper presents some of the problems that time-stamping techniques are confronted with and tries to put the advantages and disadvantages of the different available time-stamping schemes in perspective. The paper also aims to propose one possibility to overcome the current dead-end in achieving highly secure time-stamping schemes.