New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients (Applications) (<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
Linking schemes have been proposed assuming the model where the time-stamp issuer need not be trusted. However, in that environment, a fake chain attack arid forward or backward dating attacks are still a residual risk in Time-Stamping services (TSS). In this paper, we propose a new time-stamping scheme that focuses on these problems. In our scheme, we use pseudonyms to prevent the time-stamp issuer from dating the time that the specific entity requests. Our scheme doesn't rely on only one trustworthy entity, and uses mutual communication between each entity. Two types of entities, server and clients without any trustworthy entities are configured in our system. The server provides an anonymous communication channel, but doesn't provide TSS, and the clients are not only time-stamp requesters but also issuers. So, when a client requests a time-stamp from the system, it is issued by one of the other clients.
- 社団法人電子情報通信学会の論文
- 2004-01-01
著者
-
KIYOMOTO Shinsaku
KDDI R & D Laboratories Inc.
-
TANAKA Toshiaki
KDDI R & D Laboratories Inc.
-
NAKAO KOJI
KDDI RD Laboratories, Inc.
-
Kiyomoto Shinsaku
Kddi R&d Laboratories Inc.
-
Tanaka T
Kddi R & D Laboratories Inc.
-
Tanaka Toshiaki
Kddi R&d Laboratories Inc.
-
Nakao Koji
Kddi R&d Laboratories Inc.
-
Nakao Koji
Kddi R&apm;d Laboratories Inc.
-
Yamada A
Wireless Laboratories Ntt Docomo Inc.
-
YAMADA AKIRA
KDDI R & D Laboratories Inc.
-
KIYOMOTO Shinsaku
KDDI R&D Laboratories, Inc.
関連論文
- Gap Diffie-Hellman署名に基づいた階層表記型多重署名方式(情報セキュリティ,ライフログ活用技術,ライフインテリジェンス,オフィス情報システム,一般)
- 回覧文書閲覧確認に適した階層表記型多重署名方式の提案と実装評価(社会基盤としてのインターネットアーキテクチャ論文)
- B-19-16 ポインタ変数の符号化による難読化方式(B-19.ネットワークソフトウェア,一般セッション)
- A-7-9 SCHにおけるメッセージ入力(A-7.情報セキュリティ,一般セッション)
- Gap Diffie-Hellman署名に基づいた階層表記型多重署名方式(情報セキュリティ,ライフログ活用技術,ライフインテリジェンス,オフィス情報システム,一般)
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- ストリーム暗号K2に対するサイドチャネル攻撃と対策手法
- B-19-23 任意型の変数の符号化による難読化方式(B-19.ネットワークソフトウェア,一般セッション)
- Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation
- A Single-Chip MPEG-2 422P@ML Video, Audio, and System Encoder with a 162MHz Media-processor Core and Dual Motion Estimation Cores
- Signal Integrity Design and Analysis for a 400 MHz RISC Microcontroller
- Design and implementation of secure area expansion scheme for public wireless LAN services (特集 センサネットワーク)
- B-5-152 Impact of EDCA Parameters on Throughput Improvement in Layer-2 Mesh Networks with Hidden Terminal Problems
- B-5-151 EDCA Based Congestion Control Method for WLAN Mesh Networks
- Experimental Evaluation of Adaptive Contention Window Control for Layer-2 Mesh Networks
- Performance Evaluation of Mesh Network using Multi Frequency Bands
- Enhancement of Mesh Network Oriented IEEE802.11 MAC Protocol
- Performance Evaluation of Mesh Network using Multi Frequency Bands
- Enhancement of Mesh Network Oriented IEEE802.11 MAC Protocol
- B-5-250 Fairness Improvement by Enhanced IEEE802.11 MAC Protocol in Wireless Mesh Network
- B-5-249 Enhancement of Mesh Network Oriented IEEE802.11 MAC Protocol
- T/TCP for DNS: A Performance and Security Analysis (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- B-18-4 非接触型掌紋認証を用いたリモート認証システムの提案(B-18.バイオメトリックシステムセキュリティ,一般セッション)
- A Novel Error Control Algorithm for Reducing Transmission Delay in Real-Time Mobile Video Communication (Special Issue on Multimedia Mobile Communication Systems)
- Characteristics of Video Communication System in Mobile Radio Channel (Special Issue on Mobile Computing)
- A Study on Reducing Transmission Delay in Mobile Video Communication Systems (Special Section on Mutli-dimensional Mobile Information Network)
- A Novel Coherent Preambleless Demodulator Employing Sequential Processing for PSK Packet Signals : AFC and Carrier Recovery Circuits
- A Fast Synchronization Scheme of OFDM Signals for High-Rate Wireless LAN
- Nomadic Computing Environment Employing Wired and Wireless Networks(Special Issue on Multimedia Communications in Heterogeneous Network Environments)
- A Multi-Slot Access Protocol for TDMA-TDD Packet Radio Channel - Application to PHS Packet Data System -
- Universally composable client-to-client general authenticated key exchange (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- Universally Composable Client-to-Client General Authenticated Key Exchange
- B-19-18 難読化に基づくソフトウェア盗用の検知手法(B-19.ネットワークソフトウェア,一般セッション)
- A-7-9 SCHにおけるメッセージ入力関数の比較(A-7.情報セキュリティ,一般セッション)
- A-7-3 鍵交換プロトコルの安全性検証手法の実装(A-7.情報セキュリティ,一般セッション)
- A-7-2 環境に応じた暗号プロトコルの動的変更方式の提案(A-7. 情報セキュリティ,一般セッション)
- L-035 鍵交換プロトコルの安全性の検証ポイントに関する検討(ネットワーク・セキュリティ,一般論文)
- Efficient Implementation of the Pairing on Mobilephones Using BREW
- B-7-31 携帯電話上でのアイデンティティ管理技術に関する検討(B-7.情報ネットワーク,一般セッション)
- Recent Progress in GaInNAs Laser(Special Issue on Advanced Optical Devices for Next Generation Photonic Networks)
- A 1.3-μm GaInNAs/GaAs Single-Quantum-Well Laser Diode with a High Characteristic Temperature over 200 K
- ワンセグ放送向けストリーム認証方式
- A Low-Power Microcontroller with Body-Tied SOI Technology(Low-Power System LSI, IP and Related Technologies)
- QoS Routing-Based Congestion Management over Active Internetworking System Using Stream Code (Special Issue on New Developments on QoS Technologies for Information Networks)
- Universally Composable Hierarchical Hybrid Authenticated Key Exchange(Protocols,Cryptography and Information Security)
- Review on Sufficient Conditions of SHA-0
- Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification(Biometrics)(Cryptography and Information Security)
- Investigations of Optimum Tier Architectures for ASICs(VLSI Design Technology and CAD)
- Toward the Practical Uses of Holonic Manufacturing Systems(Concurrent System Technology)
- Toward the Practical Uses of Holonic Manufacturing Systems
- Information Geometry of Mean Field Theory
- A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme
- Design of Anonymous Attribute Authentication Mechanism
- A-7-3 Revocation and Addition Mechanisms for Fast (k, n)-Threshold Schemes
- On a Fast (K, n)-Threshold Secret Sharing Scheme
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations
- Design of τ-Gradual Key-Management Schemes for Mobile Content Distribution (特集:ユビキタス時代を支えるモバイル通信と高度交通システム)
- An Obfuscation Scheme Using Affine Transformation and Its Implementation (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Design of Self-Delegation for Mobile Terminals (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- Design of Security Architecture for Beyond 3G Mobile Terminals (特集:プライバシを保護するコンピュータセキュリティ技術)
- A Real-Time MPEG2 Encoding and Decoding Architecture with a Dual-Issue RISC Processor(Special Issue on Novel VLSI Processor Architectures)
- (Network Services Basics) Notification of Certificate Revocation Status between Different Domains under a PKI System ( Object-Oriented Technologies)
- FOREWORD
- A-7-9 Key Management for Privacy Protection in Sensor Information Network using Threshold Cryptography
- A-7-18 Proposal of Privacy Protection Mechanism for Sensor Information Network
- Implementation and Evaluation of a Micropayment System for Mobile Environments (Security and Society)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients (Applications) (Cryptography and Information Security)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients
- A Study of Access Control Method for Mobile Agents by Using Secure Stubs (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation
- Secure Host Name Resolution Infrastructure for Overlay Networks(Networking Technologies for Overlay Networks)
- データ重要度可視化手法の検討
- Improved Subset Difference Method with Ternary Tree
- A 2V 250 MHz VLIW Multimedia Processor(Special Issue on Multimedia, Network, and DRAM LSIs)
- 端末プラットホーム技術の研究開発について(総合報告)
- Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation
- Zero-Knowledge and Correlation Intractability(Information Security)
- Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques(Information Hiding, Cryptography and Information Security)
- 携帯電話におけるペアリング暗号の実装(情報セキュリティ基礎,電子情報通信分野における萌芽的研究論文)
- Software Protection Combined with Tamper-Proof Device
- 携帯電話におけるペアリング暗号の実装
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism
- Design of Self-Delegation for Mobile Terminals
- Design of Self-Delegation for Mobile Terminals
- Fast Implementation of KCipher-2 for Software and Hardware
- Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure
- An Obfuscation Scheme Using Affine Transformation and Its Implementation
- BS-7-44 Decodability Attacks in XOR Network Coding
- An Obfuscation Scheme Using Affine Transformation and Its Implementation
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism