Introduction
As more and more of the world’s data is created, stored, and manipulated online, it is sometimes crucial to verify when a digital document or record was created or last modified. Ideally, any time-stamping procedures to do this should depend only on the data in the document in question, and should not be susceptible to tampering – either with the data, or with the time and date.
To be precise, and to fix our vocabulary, a time-stamping system consists of two procedures: a certification procedure, which produces for any digital record a time-stamp certificate attesting to the time of certification; and a validation procedure, which checks whether or not a given record–certificate pair is valid. Naturally, the aim is to ensure that the only pairs that will pass the validation test are those consisting of a record and a correctly computed time-stamp certificate for that record.
In many situations, a time-stamp certificate for a document will be more important as an...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Adams C, Cain P, Pinkas D, Zuccherato R (2001) Internet X.509 public key infrastructure time stamp protocols (TSP). Internet Engineering Task Force IETF RFC 3161, http://www.ietf.org/
Baric N, Pfitzmann B (1997) Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy W (ed) Advances in cryptology – EUROCRYPT’97. Lecture notes in computer science, vol 1233. Springer, Berlin, pp 480–494
Bayer D, Haber S, Stornetta WS (1993) Improving the efficiency and reliability of digital time-stamping. In: Capocelli RM, De Santis A, Vaccaro U (eds) Sequences II: methods in communication, security, and computer science. Proceedings of the sequences workshop, Positano, Italy, 1991. Springer, Berlin, pp 329–334
Benaloh J, de Mare M (1991) Efficient broadcast time-stamping. Technical Report TR-MCS-91-1. Clarkson University Department of Mathematics and Computer Science
Benaloh J, de Mare M (1993) One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth Tor (ed) Advances in cryptology – EUROCRYPT’93. Lecture notes in computer science, vol 765. Springer, Berlin, pp 274–285
Boneh D, Franklin M (2001) Efficient generation of shared RSA keys. J ACM 48(4):702–722
Buldas A, Laud P, Lipmaa H, Villemson J (1998) Time-stamping with binary linking schemes. In: Krawczyk Hugo (ed) Advances in cryptology – CRYPTO’98. Lecture notes in computer science, vol 1462. Springer, Berlin, pp 486–501
Haber S, Stornetta WS (1991) How to time-stamp a digital document. J Cryptol 3(2):99–111
Haber S, Stornetta WS (1992) Method for secure time-stamping of digital documents. US Patent 5,136,647, issued August 1992; Re. 34,954, reissued May 1995
Haber S, Stornetta WS (1992) Digital document time-stamping with catenate certificate. US Patent 5,136,646, August 1992
International Organization for Standardization (2002–2003) Information technology-Security techniques – Time-stamping services. ISO/IEC 18014 (parts 1–3). http://www.iso.ch/
Massias H, Serret Avila X, Quisquater J-J (1999) Design of a secure timestamping service with minimal trust requirements. In: Vanroose P, Barbé A, van der Meulen EC (eds) Twentieth symposium on information theory in the benelux, 79–86 May 1999
Merkle R (1980) Protocols for public key cryptosystems. In: Proceedings of the 1980 symposium on security and privacy. IEEE Computer Society Press, Los Alamitos, CA, 122–133
Nyberg K (1996) Commutativity in cryptography. In: Gruyter Walter de (ed) Proceedings of the first international workshop on functional analysis at Trier University, 331–342
Sander T (1999) Efficient accumulators without trapdoor. In: Varadharajan Vijay, Yi Mu (eds) Proceedings of the second international conference on information and communication security. Lecture notes in computer science, vol 1726. Springer, Berlin, pp 252–262
Surety. http://www.surety.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Haber, S., Massias, H. (2011). Time-Stamping. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_136
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_136
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering