Long-term secure time-stamping using preimage-aware hash functions: (Short version)

4Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The lifetime of commonly used digital signature schemes is limited because their security is based on computational assumptions that potentially break in the future. In 1993, Bayer et al. suggested that the lifetime of a digital signature can be prolonged by time-stamping the signature together with the signed document. Based on this idea, various long-term timestamp schemes have been proposed and standardized that repeatedly renew the protection with new timestamps. In order to minimize the risk of a design failure affecting the security of these schemes, it is indispensable to formally analyze their security. However, many of the proposed schemes have not been subject to a formal security analysis yet. In this paper, we address this issue by formally describing and analyzing a long-term timestamp scheme that uses hash trees for timestamp renewal. Our analysis shows that the security level of the described scheme degrades cubic over time, which suggests that in practice the scheme should be instantiated with a certain security margin.

Cite

CITATION STYLE

APA

Buldas, A., Geihs, M., & Buchmann, J. (2017). Long-term secure time-stamping using preimage-aware hash functions: (Short version). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10592 LNCS, pp. 251–260). Springer Verlag. https://doi.org/10.1007/978-3-319-68637-0_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free