Presentation 2004-12-17
Threat analysis of Event-Ordering Systems
Shingo ORIHARA, Satoshi ONO, Eiichi HORITA, Hidetaka ISHIMOTO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Time-stamping digital documents is now becoming increasingly important. Several time-stamping schemes have been proposed and some of them have been put into service. There are, however, several problems with existing time-stamping systems, such as expiration of public-key certificates, key compromise and existence of single point of attack. In this paper, we propose a new time-stamping scheme that is intended to solve these problems by using an event-ordering system, and present a threat analysis of the scheme.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) time-stamp / event-ordering system / Merkle tree
Paper # ISEC2004-104
Date of Issue

Conference Information
Committee ISEC
Conference Date 2004/12/10(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Threat analysis of Event-Ordering Systems
Sub Title (in English)
Keyword(1) time-stamp
Keyword(2) event-ordering system
Keyword(3) Merkle tree
1st Author's Name Shingo ORIHARA
1st Author's Affiliation NTT Information Sharing Platform Laboratories()
2nd Author's Name Satoshi ONO
2nd Author's Affiliation NTT Information Sharing Platform Laboratories
3rd Author's Name Eiichi HORITA
3rd Author's Affiliation NTT Information Sharing Platform Laboratories
4th Author's Name Hidetaka ISHIMOTO
4th Author's Affiliation NTT Information Sharing Platform Laboratories
Date 2004-12-17
Paper # ISEC2004-104
Volume (vol) vol.104
Number (no) 527
Page pp.pp.-
#Pages 7
Date of Issue