New linking schemes for digital time -

نویسندگان

  • Ahto Buldas
  • Peeter Laud
چکیده

Binary Linking Schemes (BLS) for digital time-stamping 3] provide (1) relative temporal authentication to be performed in logarithmic time, and (2) time-certiicates of reasonable size, which together with the data published in a widely available medium enable the veriier to establish their relative temporal positions, even if the database held by the Time-Stamping Service (TSS) ceases to exist. We show that the size of a time-certiicate (X) of a document X in the scheme presented in 3] is bounded by 4 log 2 N where k is the output size of the hash function and N is the number of time-stamps issued. We then present a new BLS with (X) 6 log 2 3 k log 2 N and prove that the presented scheme is optimal in that sense.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New linking schemes for digital time-stamping

Binary Linking Schemes (BLS) for digital time-stamping [3] provide (1) relative temporal authentication to be performed in logarithmic time, and (2) time-certi cates of reasonable size, which together with the data published in a widely available medium enable the veri er to establish their relative temporal positions, even if the database held by the Time-Stamping Service (TSS) ceases to exist...

متن کامل

Providing Interoperable Time Stamping Services

This paper presents a web-based architecture for providing digital time stamping services. Time stamping services are typically divided into schemes which rely on unconditionally trusted Time Stamping Authorities (TSAs) and schemes which do not, namely the so called linking schemes. The proposed architecture relies on a multi-tier structure. The middle-tier exposes digital time stamping functio...

متن کامل

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

A New Implementation of Maximum Power Point Tracking Based on Fuzzy Logic Algorithm for Solar Photovoltaic System

In this paper, we present a modeling and implementation of new control schemes for an isolated photovoltaic (PV) using a fuzzy logic controller (FLC). The PV system is connected to a load through a DC-DC boost converter. The FLC controller provides the appropriate duty cycle (D) to the DC-DC converter for the PV system to generate maximum power. Using FLC controller block in MATLABTM/Simulink e...

متن کامل

Lossless Microarray Image Compression by Hardware Array Compactor

Microarray technology is a new and powerful tool for concurrent monitoring of large number of genes expressions. Each microarray experiment produces hundreds of images. Each digital image requires a large storage space. Hence, real-time processing of these images and transmission of them necessitates efficient and custom-made lossless compression schemes. In this paper, we offer a new archi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998