Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2002.9C.6.817

The Design & Analysis of Time-Stamp Protocol with H-Binary Tree  

Jung, Kyung-Won (숭실대학교 대학원 컴퓨터학과)
Do, Kyoung-Hwa (숭실대학교 대학원 컴퓨터학과)
Jun, Moon-Seog (숭실대학교 정보과학대학)
Abstract
We want to find a timestamping method which improves efficient performance and have high-level security to send secured messages in the digital signature and the law of e-commerces. Our paper shows a H-binary tree of time stamp to use a time stamp protocol with high suity and performance in the packets of sending messages. We implement and analyze the protocols, show to compare with previous RSA methods. Our proposed protocol has O(log n) time complexity and high-performance.
Keywords
Time Stamp Protocol; Time Stamp; E-Document; PKI;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson, 'Time-Stamping With Binary Linking Schemes,' Crypto '98, http://home.cyber.ee/helger/papers/bllv98.html
2 Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, 'Handbook of Applied Cryptography,' July, 1999, CRC Press, http://cacr.math.uwaterloo.ca/hac/
3 A. Michael Froomkin, 'The essential role of Trusted Third Parties in Electronic Commerce,' 75 Oregon L. Rev. 49, 1996, http://www.law.miami.edu/~froomkin/articles/trusted1.htm
4 Ahto Buldas, Helger Lipmaa, Berry Schoenmakers, 'Optimally Efficient Accountable Time-Stamping,' PKC 2000, http://home.cyber.ee/helger/papers/bls00.html
5 Josh Benaloh and Michael de Mare, 'Efficient Broadcast Time-Stamping,' Microsoft Research Lab., http://www.research.microsoft.com/crypto/papers/tss.ps
6 Mike Just, 'Techniques for Digital Timestamping,' available at http://www.scs.carleton.ca/~just/papers/CAMS97_slides.ps
7 Bruce Schneier, 'Applied Cryptography-Protocols, Algorithms and Source Code in C,' John Wiley & Sons, 1994
8 Chiara Bulgarelli, 'Tecniche di Time-Stamping,' (in italian), available at http://www.cs.unibo.it/~bulgarel/homepg/critto.html
9 Helger Lipmaa, 'Digital Signatures and Authentication,' version 2.0, June, 1999, Cybernetica, available at http://www.cyber.ee/infosecurity/resources/auth/
10 Netscape Communications Corporation, 'Introduction to Public-Key Cryptpgraphy,' available at http://www.iplanet.com/developer/docs/articles/security/pki.thml
11 Stuart Haber and Wakefield Scott Stornetta, 'How to Time-Stamp a Digital Document,' Journal of Cryptology, Vol.3, No.2, pp.99-111, 1991   DOI
12 Stuart Haber, Kaliski, W. Scott Stornetta, 'How Do Digital Time-Stamps Support Digital Signatures?,' Cryptobytes ( The RSA security magazine), available at ftp://ftp.rsa.com/pub/cryptobytes/crypto1n3.pdf