Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Proceedings of the 4th ACM conference on Computer and communications security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Time-Stamping with Binary Linking Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
RIPEMD-160: A Strengthened Version of RIPEMD
Proceedings of the Third International Workshop on Fast Software Encryption
Encapsulating legacy software for use in client/server systems
WCRE '96 Proceedings of the 3rd Working Conference on Reverse Engineering (WCRE '96)
Hi-index | 0.00 |
This paper describes the results of a research activity conducted cooperatively by an academic and an industrial party. It presents a practical solution for and an experience in the implementation of time stamping services and their exposition to the Internet. We present the main state-of-the-art algorithms for time stamping applications, thoroughly discuss pros and cons of each technique, and highlight the crucial issues raised by their practical implementation. Then we present an architecture which provides both relative temporal authentication, based on a linear linking scheme, and absolute temporal authentication, based on publishing mechanisms as well as on a trusted time source. In order to guarantee ubiquity and interoperability, the actual implementation of the proposed architecture relies on the emerging Web services technology for exposing time stamping functionalities to the Internet. Experimental tests have demonstrated the effectiveness of the proposed solution.