Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees
暂无分享,去创建一个
[1] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[2] Stuart Haber,et al. Improving the Efficiency and Reliability of Digital Time-Stamping , 1993 .
[3] Ahto Buldas,et al. Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size , 2013, ACISP.
[4] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[5] Ahto Buldas,et al. On Provably Secure Time-Stamping Schemes , 2004, ASIACRYPT.
[6] Ahto Buldas,et al. Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping , 2010, ACISP.