Time-Stamping with Binary Linking Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Timestamps: Main Issues on Their Use and Implementation
WETICE '99 Proceedings of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Optimally Efficient Accountable Time-Stamping
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A Temporal Order Resolution Algorithm in the Multi-server Time Stamp Service Framework
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
SE'07 Proceedings of the 25th conference on IASTED International Multi-Conference: Software Engineering
Some critical aspects of the PKIX TSP
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Certification validation: back to the past
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Certification validation: Back to the past
Computers & Mathematics with Applications
Hi-index | 0.00 |
The need to link human actions or paper documents to a moment in time is not new, but the solutions available for the real world do not fit the digital world. Most of the security mechanisms based on key cryptography are short-term solutions and stop working after private keys or algorithms are compromised. The legal requirement of introducing an electronic equivalent for classic paper documents encounters problems, one of them being the difficulty of having secure and trustworthy digital time-stamps. Time-stamping is a relatively new research field which is trying to address the problems related to time and cryptography. But are the currently available time-stamping schemes and standards enough to build secure solutions? Can users rely on the time parameter provided by the time-stamping authority, or can they control its behavior? If not, what design requirements should a new time-stamping scheme consider, in order to fulfill all these goals? Our paper discusses the relationship and interaction between time and cryptography by analyzing all currently available state-of-the-art time-stamping schemes. The article lists a set of design requirements and properties that software developers should consider when implementing secure time-stamping services.