2004
DOI: 10.1007/978-3-540-28628-8_28
|View full text |Cite
|
Sign up to set email alerts
|

Non-interactive Timestamping in the Bounded Storage Model

Abstract: Abstract.A timestamping scheme is non-interactive if a stamper can stamp a document without communicating with any other player. The only communication done is at validation time. Non-Interactive timestamping has many advantages, such as information theoretic privacy and enhanced robustness. Unfortunately, no such scheme exists against polynomial time adversaries that have unbounded storage at their disposal. In this paper we show non-interactive timestamping is possible in the bounded storage model. In this m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2005
2005
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…Therefore, the above attack is unavoidable in such kind of yoking‐proof schemes. We now state the following theorems about the security and privacy of the proposed scheme.Theorem Let t 1 and t 2 be the secure timestamps and PRF be the secure pseudorandom function . The yoking‐proof scheme Π in Section 3.1 is secure under Definition .…”
Section: Proposed Yoking‐proof Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the above attack is unavoidable in such kind of yoking‐proof schemes. We now state the following theorems about the security and privacy of the proposed scheme.Theorem Let t 1 and t 2 be the secure timestamps and PRF be the secure pseudorandom function . The yoking‐proof scheme Π in Section 3.1 is secure under Definition .…”
Section: Proposed Yoking‐proof Schemementioning
confidence: 99%
“…The yoking‐proof scheme Π in Section 3.1 is secure under Definition . The proof is given in Appendix .Theorem Let t 1 and t 2 be the secure timestamps and PRF be the secure pseudorandom function . The yoking‐proof scheme Π in Section 3.1 is private under Definition .…”
Section: Proposed Yoking‐proof Schemementioning
confidence: 99%
“…In the classical literature, almost every timestamping service requires interaction with a group of validators and provides security guarantees only for relative timestamping. Non-interactive timestamping has been explored before in [MSTS04], where the authors present a generic impossibility result, as an adversarial prover would simply need to simulate the execution of an honest prover to generate a fake timestamp. They sidestep this result by working in the bounded-storage model where they construct a secure protocol.…”
Section: Introductionmentioning
confidence: 99%
“…Such a scheme clearly does not exist without a bound on the committer's memory, even under computational assumptions and using quantum communication: a corrupt committer could always store (possibly quantumly) all the information sent, until opening time, and only then follow the honest committer's algorithm to figure out what should be sent to convincingly open a 0 or a 1. Note that in the classical bounded-storage model, it is known how to do time-stamping that is noninteractive in our sense: a player can time-stamp a document while only receiving information [14]. However, no reasonable BC protocol that time-stamps a bit exist in this model.…”
Section: Introductionmentioning
confidence: 99%