Synchronizing Time Distribution
DOI:
https://doi.org/10.29304/jqcm.2022.14.4.1128Keywords:
Time stamp, Distributed time stamp, Digital documents, Security, transactionAbstract
With the wide span of internet brought great progress in different parts of human life, a digital documents have been employed as a media in exchange information between internet parties like text, audio, pictures and videos that leads to the issue of how to certify the document when created or modified in order to use it as secure digital media for storing information and transactions. This tend to employ security technique for ensuring the documents integrity for a long period. One of these techniques is the time stamp that has many schemes. This research concentrate on distributed time-stamp scheme as a one of time stamp schemes, that suffers from drawback in achieving trusted security to overcome this draws a new technique issued to this scheme called "Synchronizing Process".
Downloads
References
[2] Stuart. Haber, Kaliski. Burt and Stornetta.Wakefield Scott ,“How Do Digital Time-Stamps SupportDigital Signatures?”,CryptoByte, 1 (3), (1995), pp.14-15, (http://www.rsa.com/rsalabs/.
[3] Stuart. Haber, W. Scott, "How to Time Stamp Digital Document", journal of cryptology, vol:3, no:2, (1991), pp: 99-11.
[4] International Organization for Standardization and International ElectrotechnicalCommission,ISO/IEC JTC 1/SC 27,"Information technology-Security techniques", Germany Din, (2000).
[5] International Organization for Standardization and International ElectrotechnicalCommission,ISO/IEC Working Draft 18014-1: Information technology - Security techniques -Time stampingservices -Part 1: Framework, http://csrc.nist.gov/cc/t4/sc27/post-londonfiles/27n2595.pdf, (2000).
[6] Surety.com; "Secure Time/Data Stamping in a Public Key Infrastructure", http://www.surety.com/home/pki.pdf, 2001.
[7] Une, Masashi, and Matsumoto. Tsutomu, “Relations between Security and Verification Procedures ofTime Stamps",Proceedings of the 2001 Symposium on Cryptography and Information Security,The Institute of Electronics, Information and Communication Engineers, (2001) pp.629-634.
[8] Karel. Wouters, " Time-Stamping: a survey", (1995), Available at: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=07147a4bfe6f61901a953c52ab29fcf2cfde2cf3