DOI QR코드

DOI QR Code

The Design & Analysis of Time-Stamp Protocol with H-Binary Tree

H-이진트리 구조를 갖는 타임스탬프 설계 및 분석

  • 정경원 (숭실대학교 대학원 컴퓨터학과) ;
  • 도경화 (숭실대학교 대학원 컴퓨터학과) ;
  • 전문석 (숭실대학교 정보과학대학)
  • Published : 2002.12.01

Abstract

We want to find a timestamping method which improves efficient performance and have high-level security to send secured messages in the digital signature and the law of e-commerces. Our paper shows a H-binary tree of time stamp to use a time stamp protocol with high suity and performance in the packets of sending messages. We implement and analyze the protocols, show to compare with previous RSA methods. Our proposed protocol has O(log n) time complexity and high-performance.

전자문서의 안전한 전송과 법적인 시점확인을 위하여 안전하고. 효율적인 타임스탬프 방법이 요구된다. 된 논문은 H-이진트리에서 작성되는 타임스탬프 구조를 이용하여, 간단하고 효율적인 전자문서 패킷을 작성할 수 있는 프로토콜을 제안한다. 기존 전자서명에이용되고 있는 RSA 프로토콜은 비도면에서 취약하기 때문에, 강한 타임스탬프 구조가 요구된다. 이러한 문제점을 보완하기 위해서 이론적으로 트리구조를 갖는 형태이며 H-이진트리O(logn) 시간복잡도를 갖는, 전자문서에 대한 타임스탬프 프로토콜을 설계하고 기존의 프로토콜 방식과 비교 분석한다.

Keywords

References

  1. Ahto Buldas, Helger Lipmaa, Berry Schoenmakers, 'Optimally Efficient Accountable Time-Stamping,' PKC 2000, http://home.cyber.ee/helger/papers/bls00.html
  2. Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson, 'Time-Stamping With Binary Linking Schemes,' Crypto '98, http://home.cyber.ee/helger/papers/bllv98.html
  3. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, 'Handbook of Applied Cryptography,' July, 1999, CRC Press, http://cacr.math.uwaterloo.ca/hac/
  4. A. Michael Froomkin, 'The essential role of Trusted Third Parties in Electronic Commerce,' 75 Oregon L. Rev. 49, 1996, http://www.law.miami.edu/~froomkin/articles/trusted1.htm
  5. Bruce Schneier, 'Applied Cryptography-Protocols, Algorithms and Source Code in C,' John Wiley & Sons, 1994
  6. Chiara Bulgarelli, 'Tecniche di Time-Stamping,' (in italian), available at http://www.cs.unibo.it/~bulgarel/homepg/critto.html
  7. Helger Lipmaa, 'Digital Signatures and Authentication,' version 2.0, June, 1999, Cybernetica, available at http://www.cyber.ee/infosecurity/resources/auth/
  8. Josh Benaloh and Michael de Mare, 'Efficient Broadcast Time-Stamping,' Microsoft Research Lab., http://www.research.microsoft.com/crypto/papers/tss.ps
  9. Mike Just, 'Techniques for Digital Timestamping,' available at http://www.scs.carleton.ca/~just/papers/CAMS97_slides.ps
  10. Netscape Communications Corporation, 'Introduction to Public-Key Cryptpgraphy,' available at http://www.iplanet.com/developer/docs/articles/security/pki.thml
  11. Stuart Haber, Kaliski, W. Scott Stornetta, 'How Do Digital Time-Stamps Support Digital Signatures?,' Cryptobytes ( The RSA security magazine), available at ftp://ftp.rsa.com/pub/cryptobytes/crypto1n3.pdf
  12. Stuart Haber and Wakefield Scott Stornetta, 'How to Time-Stamp a Digital Document,' Journal of Cryptology, Vol.3, No.2, pp.99-111, 1991 https://doi.org/10.1007/BF00196791