Sciweavers

Share
ACNS
2006
Springer

Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?

11 years 5 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents before sending them to time-stamping servers and server-side hash functions used for establishing one way causal relations between time stamps. We derive necessary and sufficient conditions for client side hash functions and show by using explicit separation techniques that neither collisionresistance nor 2nd preimage resistance is necessary for secure time-stamping. Moreover, we show that server side hash functions can even be not one-way. Hence, it is impossible by using black-box techniques to transform collisionfinders into wrappers that break the corresponding time-stamping schemes. Each such wrapper should analyze the structure of the hash function. However, these separations do not necessarily hold for more specific classes of hash functions. Considering this, we take a more detailed look at the structu...
Ahto Buldas, Sven Laur
Added 13 Jun 2010
Updated 13 Jun 2010
Type Conference
Year 2006
Where ACNS
Authors Ahto Buldas, Sven Laur
Comments (0)
books