Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have been published. We try to establish such proof and conclude that the existing security conditions are improper because they ignore precomputations by adversaries. After analyzing a simplistic patent filing scenario, we suggest a new security condition for time-stamping schemes that leads to a new security property of hash functions – chain-resistance. We observe that if the variety of possible shapes of hash-chains is polynomial (and the verification procedure is suitably improved), then the time-stamping scheme becomes provably secure, assuming that the underlyi...
Abstract. We prove in a non-black-box way that every bounded list and set commitment scheme is knowl...
This paper determines an exact relationship between collision-free hash functions and other cryptogr...
Abstract. We present a new tighter security proof for unbounded hash tree keyless signature (time-st...
Abstract. We study the influence of collision-finding attacks on the security of time-stamping schem...
Käesolevas töös uurime piiranguteta ajatempliskeemi jaoks turvaliste räsifunktsioonide konstrueerimi...
We construct a publicly verifiable protocol for proving computational work based on collision-resist...
Abstract. Digital timestamping is a cryptographic technique allowing affixing a reliable date to a d...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
Commonly used digital signature schemes have a limited lifetime because their security is based on c...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
To establish that a document was created after a given moment in time, it is necessary to report eve...
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for...
In this paper, we present a construction of hash functions. These functions are collision free in th...
Abstract. There is a foundational problem involving collision-resistant hash-functions: common const...
Abstract. We prove in a non-black-box way that every bounded list and set com-mitment scheme is know...
Abstract. We prove in a non-black-box way that every bounded list and set commitment scheme is knowl...
This paper determines an exact relationship between collision-free hash functions and other cryptogr...
Abstract. We present a new tighter security proof for unbounded hash tree keyless signature (time-st...
Abstract. We study the influence of collision-finding attacks on the security of time-stamping schem...
Käesolevas töös uurime piiranguteta ajatempliskeemi jaoks turvaliste räsifunktsioonide konstrueerimi...
We construct a publicly verifiable protocol for proving computational work based on collision-resist...
Abstract. Digital timestamping is a cryptographic technique allowing affixing a reliable date to a d...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
Commonly used digital signature schemes have a limited lifetime because their security is based on c...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
To establish that a document was created after a given moment in time, it is necessary to report eve...
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for...
In this paper, we present a construction of hash functions. These functions are collision free in th...
Abstract. There is a foundational problem involving collision-resistant hash-functions: common const...
Abstract. We prove in a non-black-box way that every bounded list and set com-mitment scheme is know...
Abstract. We prove in a non-black-box way that every bounded list and set commitment scheme is knowl...
This paper determines an exact relationship between collision-free hash functions and other cryptogr...
Abstract. We present a new tighter security proof for unbounded hash tree keyless signature (time-st...