Proceedings of the 4th ACM Conference on Computer and Communications Security 1997
DOI: 10.1145/266420.266430
|View full text |Cite
|
Sign up to set email alerts
|

Secure names for bit-strings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
53
0
1

Year Published

2002
2002
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 102 publications
(54 citation statements)
references
References 21 publications
0
53
0
1
Order By: Relevance
“…Bayer, Haber and Stornetta [3] improve upon the linking scheme, reducing the communication and storage requirements of the system and increasing its robustness, by replacing the linear list with a tree. Further work [17,7,6,8,5,4] is mainly focused on additional improvements in terms of storage, robustness and reducing the trust required in the timestamping server(s).…”
Section: Previous Workmentioning
confidence: 99%
“…Bayer, Haber and Stornetta [3] improve upon the linking scheme, reducing the communication and storage requirements of the system and increasing its robustness, by replacing the linear list with a tree. Further work [17,7,6,8,5,4] is mainly focused on additional improvements in terms of storage, robustness and reducing the trust required in the timestamping server(s).…”
Section: Previous Workmentioning
confidence: 99%
“…We observe that the formal security condition stated in [5] is unreachably strong because it overlooks pre-computations of the adversary.…”
Section: Introductionmentioning
confidence: 97%
“…In this paper, we revisit the security analysis of hash-based time-stamping schemes [5]. We observe that the formal security condition stated in [5] is unreachably strong because it overlooks pre-computations of the adversary.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations