An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signatures. Security is concentrated in a single, efficient component, allowing for a detailed analysis. 							
						
							
					 															
					Christian Hett, Nicolai Kuntze, Andreas U. Schmidt