[[abstract]]To ensure integrity and originality of digital information, digital signatures were proposed to provide both authority and undeniability. However, without an authenticated time-stamp we neithe rcan trust signed documents when the signer’s signature key was lost, stolen, or accidentally compromised, nor solve the cases when the signer himself repudiates the signing, claiming that he has accidentally lost his signature key. Based on relative temporal authentication, several linking schemes for digital time-stamping have been proposed to solve this problem. However, these schemes suffer from the forward forgery which is an attempt to stamp a present time-stamp on a past document by an unauthorized one. In addition, the rification c...
Abstract. Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, ...
Abstract- The integrity of digital evidence plays an important role in the digital process of forens...
International audienceThe aim of a time-stamping system is to prove the existence of a digital docum...
[[abstract]]To ensure integrity and originality of digital information, digital signatures were prop...
[[abstract]]Digital watermarking techniques have recently been proposed for the copyright protection...
To establish that a document was created after a given moment in time, it is necessary to report eve...
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for...
A signcryption scheme combining public key encryptions and digital signatures in one logical step ca...
Digital signatures are a powerful tool for demonstrating data integrity and performing source authen...
In this paper we introduce a new approach of constructing time capsule signature. Our new constructi...
[[abstract]]A proxy signature scheme is a method which allows an original signer to delegate his sig...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
International audienceTime-stamping is a technique used to prove the existence of a digital document...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
Commonly used digital signature schemes have a limited lifetime because their security is based on c...
Abstract. Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, ...
Abstract- The integrity of digital evidence plays an important role in the digital process of forens...
International audienceThe aim of a time-stamping system is to prove the existence of a digital docum...
[[abstract]]To ensure integrity and originality of digital information, digital signatures were prop...
[[abstract]]Digital watermarking techniques have recently been proposed for the copyright protection...
To establish that a document was created after a given moment in time, it is necessary to report eve...
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for...
A signcryption scheme combining public key encryptions and digital signatures in one logical step ca...
Digital signatures are a powerful tool for demonstrating data integrity and performing source authen...
In this paper we introduce a new approach of constructing time capsule signature. Our new constructi...
[[abstract]]A proxy signature scheme is a method which allows an original signer to delegate his sig...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
International audienceTime-stamping is a technique used to prove the existence of a digital document...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
Commonly used digital signature schemes have a limited lifetime because their security is based on c...
Abstract. Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, ...
Abstract- The integrity of digital evidence plays an important role in the digital process of forens...
International audienceThe aim of a time-stamping system is to prove the existence of a digital docum...