搜索结果: 1-6 共查到“军队指挥学 Time-Stamping”相关记录6条 . 查询时间(0.093 秒)
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions
Long-Term Security Timestamps Preimage Aware Hash Functions
2017/8/8
Commonly used digital signature schemes have a limited lifetime because their security is based on computational assumptions that will potentially break in the future when more powerful computers are ...
Non-Interactive Time-Stamping and Proofs of Work in the Random Oracle Model
cryptographic protocols
2012/3/23
We construct a non-interactive scheme for proving computational work in the Random Oracle Model. Given a uniformly random ``puzzle'' $P <- {0,1}^n$ (where $n$ is the security parameter), a correspondi...
On Optimal Hash Tree Traversal for Interval Time-Stamping
analysis of algorithms implementation complexity interval time-stamping
2009/4/15
Skewed trees constitute a two-parameter family of recursively constructed
trees. Recently, Willemson proved that suitably picked skewed trees are
space-optimal for interval time-stamping. At the sam...
Universally Composable Time-Stamping Schemes with Audit
Time-Stamping Provable Security One-Way Hash Functions Universal Composability
2009/2/16
We present a universally composable time-stamping scheme based on universal one-way hash functions.The model we use contains an ideal auditing functionality (implementable in the Common Reference Str...
On Universal Composable Security of Time-Stamping Protocols
time-stamping protocol universal composable security
2009/2/8
Time-stamping protocols, which assure that a document was
existed at a certain time, are applied to some useful and practical applications
such as electronic patent applications and so on. There are...
Knowledge-Binding Commitments with Applications in Time-Stamping(Full Version)
Knowledge-Binding Time-Stamping
2008/9/11
We prove in a non-black-box way that every bounded list and set commitment
scheme is knowledge-binding. This is a new and rather strong security
condition, which makes the security definitions for t...