How to time-stamp a digital document

@article{Haber2004HowTT,
  title={How to time-stamp a digital document},
  author={S. Haber and W. S. Stornetta},
  journal={Journal of Cryptology},
  year={2004},
  volume={3},
  pages={99-111}
}
  • S. Haber, W. S. Stornetta
  • Published 2004
  • Computer Science
  • Journal of Cryptology
  • The prospect of a world in which all text, audio, picture, and video documents are in digital form on easily modifiable media raises the issue of how to certify when a document was created or last changed. The problem is to time-stamp the data, not the medium. We propose computationally practical procedures for digital time-stamping of such documents so that it is infeasible for a user either to back-date or to forward-date his document, even with the collusion of a time-stamping service. Our… CONTINUE READING
    The TESLA Broadcast Authentication Protocol
    • 949
    • PDF
    A Forward-Secure Digital Signature Scheme
    • 585
    • PDF
    Secure audit logs to support computer forensics
    • 407
    • PDF
    Enabling the Archival Storage of Signed Documents
    • 57
    • PDF
    Building an Encrypted and Searchable Audit Log
    • 374
    • PDF
    Security engineering - a guide to building dependable distributed systems (2. ed.)
    • 1,813
    • PDF
    Authentic Data Publication Over the Internet
    • 165
    • PDF
    Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
    • 773
    • Highly Influenced
    • PDF

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 30 REFERENCES
    New directions in cryptography
    • 13,321
    • PDF
    Probabilistic Encryption
    • 2,730
    • PDF
    A Design Principle for Hash Functions
    • 1,131
    • PDF
    How to generate cryptographically strong sequences of pseudo random bits
    • 1,211
    • PDF
    Universal one-way hash functions and their cryptographic applications
    • 978
    • PDF
    Prediction and entropy of printed English
    • 2,287
    • PDF
    Theory and application of trapdoor functions
    • 1,073
    One-way functions are necessary and sufficient for secure signatures
    • 718
    • PDF
    Collision Free Hash Functions and Public Key Signature Schemes
    • 346
    • PDF