期刊文献+

基于PKI体系的数字时间认证方案 被引量:3

A Time Authentication Scheme Based on PKI Framework
下载PDF
导出
摘要 数字时间认证是指对电子文档产生或更改的时间进行认证 ,它在电子商务和知识产权保护中有着重要而广泛的应用 .目前采用的主要技术手段是对电子文档加盖数字时戳 .该文介绍了现有的数字时戳方案 ,根据PKI技术的发展 ,提出了一个基于PKI TSA体系的数字时间认证方案 .它使用持有数字证书的TSA充当可信第三方见证 ,可以实现对单方及多方的时间认证请求进行公正 .由于使用数字证书进行数字签名和身份认证 ,该方案在运算量、存储量及实现难度上都要优于现有的方案 . In many situations there is a need to certify the time a digital document was created or modified. Time authentication shows its importance in E-commerce and intellectual property protection. At present the main technique widely used is to time-stamp an electronic document. This paper introduces the up-to-date time-stamp protocols: linking protocol, distributed trust protocol and binary tree protocol. Linking Protocol observes the sequence of clients requesting time-stamps and is based on the fact that the hashes they submit cannot be known in advance. Distributed trust protocol selects witnesses randomly in a given group, and constitutes a believable time-stamp via their signature lists. Binary tree protocol combines hashes into one via a binary tree, and publishes the resulting single hash in newspaper advertisement. A time authentication scheme based on the PKI technology is presented. A TSA with its certificate is involved as a trusted third-party witness. Trusted time can be required, and one side or multi-side time authentication request can be responded by TSA. How to extend the lifetime of a time-stamp is also discussed. This paper evaluates the protocols above in terms of the calculation complexity, storage capacity and practicability. Since certificate technique is adopted in digital signature and authentication, the proposed scheme has advantages over other schemes in efficiency and other aspects.
出处 《计算机学报》 EI CSCD 北大核心 2003年第10期1355-1360,共6页 Chinese Journal of Computers
基金 国家自然科学基金 ( 60 0 73 0 5 2 )资助
  • 引文网络
  • 相关文献

参考文献9

  • 1Haber S, Stornetta W S. How to time-stamp a digital document. Journal of Cryptology, 1991, 3 (2):99~111.
  • 2Bayer D, Haber S, Stornetta W S. Improving the efficiency and reliability of digital time-stamping. In: Capocelli R, Desantis A,Vaccaro U eds. Proceedings of Sequences'91: Methods in Communication, Security, and Computer Science, Berlin, New York, Tokyo: Springer-Verlag, 1992. 329~334.
  • 3Benaloh J, de Mare M. Efficient broadcast time-stamping.Clarkson University Department of Mathematics and Computer Science, Technical Report 1, 1992.
  • 4Buldas A, Laud P. New linking schemes for digital time-stamping. In: Proceedings of the 1st International Conference on Information Security and Cryptology, Seoul Korea, 1998. 3~14.
  • 5Buldas A, Laud P, Lipmaa H, Villemson J. Time-stamping with binary linking schemes. In.. Proceedings of Advances in Cryptology CRYPTO'98, Santa Barbara, USA, 1998,1462:486~501.
  • 6Wang Yu-Min, He Da-Ke. Cryptography Theory & Application.Xi'an: Xidian University Press, 1990 (in Chinese).
  • 7Housley, Ford R, Polk W, Solo D. Internet X. 509 public key infrastructure, certificate and CRL profile. IETF RFC 2459,1999.
  • 8Adams C, Cain P, Pinkas D, Zuccherato R. Internet X. 509:Public key infrastructure time stamp protocol (TSP). IETF RFC 3161. 2001.
  • 9Pinkas D, Ross J, Pope N. Electronic signature formats for long term electronic signatures. IETF RFC 3126, 2001.

同被引文献44

引证文献3

二级引证文献13

;
使用帮助 返回顶部