[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

How to time-stamp a digital document

Published: 01 January 1991 Publication History

Abstract

The prospect of a world in which all text, audio, picture, and video documents are in digital form on easily modifiable media raises the issue of how to certify when a document was created or last changed. The problem is to time-stamp the data, not the medium. We propose computationally practical procedures for digital time-stamping of such documents so that it is infeasible for a user either to back-date or to forward-date his document, even with the collusion of a time-stamping service. Our procedures maintain complete privacy of the documents themselves, and require no record-keeping by the time-stamping service.

References

[1]
J. Alter. When photographs lie. Newsweek, pp. 44-45, July 30, 1990.
[2]
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13(4): 850-864, Nov. 1984.
[3]
G. Brassard and M. Yung. One-way group actions. In Advances in Cryptology--Crypto '90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.
[4]
I. Damgard. Collision-free hash functions and public-key signature schemes. In Advances in Cryptology--Eurocrypt '87, pp. 203-217. Lecture Notes in Computer Science, vol. 304, Springer-Verlag, Berlin, 1988.
[5]
I. Damgard. A design principle for hash functions. In Advances in Cryptology--Crypto '89 (ed. G. Brassard), pp. 416-427. Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990.
[6]
A. DeSantis and M. Yung. On the design of provably secure cryptographic hash functions. In Advances in Cryptology--Eurocrypt '90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.
[7]
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, 22: 644-654, Nov. 1976.
[8]
Z. Galil, S. Haber, and M. Yung. Interactive public-key cryptosystems. Submitted for publication, 1990.
[9]
S. Goldwasser and S. Micali. Probabilistic encryption. J. Comput. System Sci., 28: 270-299, April 1984.
[10]
S. Goldwasser, S. Micali, and R. Rivest. A secure digital signature scheme. SIAM J. Comput., 17(2): 281-308, 1988.
[11]
A. Grundberg. Ask it no questions: The camera can lie. The New York Times, Section 2, pp. 1, 29, August 12, 1990.
[12]
R. Impagliazzo, L. Levin, and M. Luby. Pseudorandom generation from one-way functions. In Proc. 21st STOC, pp. 12-24. ACM, New York, 1989.
[13]
R. Impagliazzo and M. Luby. One-way functions are essential for complexity-based cryptography. In Proc. 30th FOCS, pp. 230-235. IEEE, New York, 1989.
[14]
H. M. Kanare. Writing the Laboratory Notebook, p. 117. American Chemical Society, Washington, D.C., 1985.
[15]
R. C. Merkle. Secrecy, authentication, and public-key systems. Ph.D. thesis, Stanford University, 1979.
[16]
R. C. Merkle. One-way hash functions and DES. In Advances in Cryptology-Crypto '89 (ed. G. Brassard), pp. 428-446. Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990.
[17]
M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proc. 21st STOC, pp. 33-43. ACM, New York, 1989.
[18]
M. O. Rabin. Digitalized signatures. In Foundations of Secure Computation (ed. R. A. DeMillo et al.), pp. 155-168. Academic Press, New York, 1978.
[19]
R. Rivest. The MD4 message digest algorithm. In Advances in Cryptology-Crypto '90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.
[20]
J. Rompel. One-way functions are necessary and sufficient for secure signatures. In Proc. 22nd STOC, pp. 387-394. ACM, New York, 1990.
[21]
C. Shannon. Prediction and entropy of printed English. Bell System Tech. J., 30: 50-64, 1951.
[22]
A. C. Yao. Theory and applications of trapdoor functions. In Proc. 23rd FOCS, pp. 80-91. IEEE, New York, 1982.

Cited By

View all
  • (2024)Blockchain Adoption in a Supply Chain with Manufacturer Market PowerManagement Science10.1287/mnsc.2022.0250570:9(6158-6178)Online publication date: 1-Sep-2024
  • (2024)Integration of PBFT and Raft Algorithms with Recurrent Neural Networks to Improve the Reliability of Distributed SystemsComputational Science and Its Applications – ICCSA 2024 Workshops10.1007/978-3-031-65154-0_14(226-237)Online publication date: 1-Jul-2024
  • (2023)The use of blockchain technology in the scientific research workflowInformation Services and Use10.3233/ISU-23022543:3-4(289-297)Online publication date: 1-Jan-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Cryptology
Journal of Cryptology  Volume 3, Issue 2
January 1991
84 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 January 1991

Author Tags

  1. Hash
  2. Time-stamp

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Blockchain Adoption in a Supply Chain with Manufacturer Market PowerManagement Science10.1287/mnsc.2022.0250570:9(6158-6178)Online publication date: 1-Sep-2024
  • (2024)Integration of PBFT and Raft Algorithms with Recurrent Neural Networks to Improve the Reliability of Distributed SystemsComputational Science and Its Applications – ICCSA 2024 Workshops10.1007/978-3-031-65154-0_14(226-237)Online publication date: 1-Jul-2024
  • (2023)The use of blockchain technology in the scientific research workflowInformation Services and Use10.3233/ISU-23022543:3-4(289-297)Online publication date: 1-Jan-2023
  • (2023)Bitcoin-Powered IoT Networks for Climate Change Research: a Peer-to-Peer Micro-Payment System to Enhance Data CollectionProceedings of the 2023 8th International Conference on Cloud Computing and Internet of Things10.1145/3627345.3627365(139-146)Online publication date: 22-Sep-2023
  • (2023)Mnemosyne: Distributed Application Logging over Named Data NetworkingProceedings of the 10th ACM Conference on Information-Centric Networking10.1145/3623565.3623708(26-35)Online publication date: 9-Oct-2023
  • (2023)Evolution of Blockchain and consensus mechanisms & its real-world applicationsMultimedia Tools and Applications10.1007/s11042-023-14624-682:22(34363-34408)Online publication date: 6-Mar-2023
  • (2023)Machine Learning and Blockchain Intersection in Cryptocurrency Price PredictionBlockchain – ICBC 202310.1007/978-3-031-44920-8_5(72-88)Online publication date: 23-Sep-2023
  • (2023)SmartGraph: Static Analysis Tool for Solidity Smart ContractsComputational Science and Its Applications – ICCSA 2023 Workshops10.1007/978-3-031-37105-9_39(584-598)Online publication date: 3-Jul-2023
  • (2022)BlockchainProceedings of the Winter Simulation Conference10.5555/3586210.3586233(283-297)Online publication date: 11-Dec-2022
  • (2022)A novel proof of useful work for a blockchain storing transportation transactionsInformation Processing and Management: an International Journal10.1016/j.ipm.2021.10274959:1Online publication date: 1-Jan-2022
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media