New linking schemes for digital time -
نویسندگان
چکیده
Binary Linking Schemes (BLS) for digital time-stamping 3] provide (1) relative temporal authentication to be performed in logarithmic time, and (2) time-certiicates of reasonable size, which together with the data published in a widely available medium enable the veriier to establish their relative temporal positions, even if the database held by the Time-Stamping Service (TSS) ceases to exist. We show that the size of a time-certiicate (X) of a document X in the scheme presented in 3] is bounded by 4 log 2 N where k is the output size of the hash function and N is the number of time-stamps issued. We then present a new BLS with (X) 6 log 2 3 k log 2 N and prove that the presented scheme is optimal in that sense.
منابع مشابه
New linking schemes for digital time-stamping
Binary Linking Schemes (BLS) for digital time-stamping [3] provide (1) relative temporal authentication to be performed in logarithmic time, and (2) time-certi cates of reasonable size, which together with the data published in a widely available medium enable the veri er to establish their relative temporal positions, even if the database held by the Time-Stamping Service (TSS) ceases to exist...
متن کاملProviding Interoperable Time Stamping Services
This paper presents a web-based architecture for providing digital time stamping services. Time stamping services are typically divided into schemes which rely on unconditionally trusted Time Stamping Authorities (TSAs) and schemes which do not, namely the so called linking schemes. The proposed architecture relies on a multi-tier structure. The middle-tier exposes digital time stamping functio...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملA New Implementation of Maximum Power Point Tracking Based on Fuzzy Logic Algorithm for Solar Photovoltaic System
In this paper, we present a modeling and implementation of new control schemes for an isolated photovoltaic (PV) using a fuzzy logic controller (FLC). The PV system is connected to a load through a DC-DC boost converter. The FLC controller provides the appropriate duty cycle (D) to the DC-DC converter for the PV system to generate maximum power. Using FLC controller block in MATLABTM/Simulink e...
متن کاملLossless Microarray Image Compression by Hardware Array Compactor
Microarray technology is a new and powerful tool for concurrent monitoring of large number of genes expressions. Each microarray experiment produces hundreds of images. Each digital image requires a large storage space. Hence, real-time processing of these images and transmission of them necessitates efficient and custom-made lossless compression schemes. In this paper, we offer a new archi...
متن کامل