A digital signature is a cryptographic material which guarantees the integrity of the signed data. Besides that, it provides a way to authenticate the signer. To verify a digital signature, you need the associated digital certificate. A digital certificate has a limited lifetime of up to 3 years, but documents tend to be stored for a significantly longer time. Moreover, their respective digital signatures’ validity must be kept so that the data integrity and the non-repudiation of the signing act remain intact. As a consequence, the following problem arises: how to prove that the certificate of the key used to sign the data was valid at the time the signature was created?
Timestamping is a cryptographic service that provides verifiable proof that a piece of data existed at a specific point in time. It works by having a trusted third party, called a Time-Stamping Authority (TSA), digitally sign a hash of some data sent by a client, along with the current time. A key aspect about Time-Stamping Authorities is that their sole role is to bind data to a point in time. The client’s data can be anything from a PDF signed with a key whose certificate has expired or been revoked to some arbitrary binary data. The TSA job is kept simple and focused on one job: providing trusted and secure timestamps.
Using timestamping services together with digital signatures can solve the lack of future validity of signatures after the associated certificates have expired. If the timestamp obtained from a TSA is proper and it falls in the validity period of the certificate used to sign the timestamped data, then that signature is considered to be valid as well, even after the client certificate has expired.
2.2. Enterprise Landscape
The European Union maintains a public list of active Trust Service Providers through the European Union Trusted List (EUTL). These providers are divided into two categories: qualified and non-qualified. Qualified Trust Service Providers are entities authorized to provide high-security digital trust services under eIDAS regulation and are regularly audited by national supervisory bodies to verify their compliance with ETSI standards. One such service offered by QTSPs is a qualified timestamping service.
The qualified timestamp service is audited and certified for compliance to ETSI standards EN 319 401 [
9], EN 319 421 [
8], and EN 319 422 [
13]. In case of a legal dispute, a qualified electronic timestamp can be used as a legitimate source of information as it possesses the quality of accurately indicating the date and time at which the timestamp was created for its respective data.
As blockchain started to become a relevant solution for businesses to market and offer distributed trust solutions, various European companies integrated blockchain anchoring in their timestamping services. These alternatives provide tamper-proof evidence and enhanced data integrity by recording timestamp-relevant information on a distributed ledger.
The blockchain capabilities are used in several key ways for augmenting the timestamping process. The most common approach involves hash anchoring, which simply creates a hash of the document or data, records the hash in a blockchain transaction, and uses the ledger as a proof of existence for that hash at a specific time. One such solution is WordProof (The Netherlands), which provides blockchain timestamping for web content. It works by generating a hash for each piece of published content and stores the result on a blockchain. This way, the original publication time can be easily proven. Another way of leveraging the blockchain is the use of the OpenTimestamps Protocol. This is a specific protocol for anchoring timestamps in a Bitcoin network. It creates a Merkle tree of multiple document hashes and anchors only the root hash in a Bitcoin transaction. One company using this method is Intesi Group (Italy). The Intesi Group approach is fully compliant with RFC 3161. The company also authored an IETF draft specification (draft-intesigroup-dlts) (
https://datatracker.ietf.org/doc/html/draft-intesigroup-dlts-00, accessed on 20 September 2025) defining how to extend a timestamp token to support blockchain anchoring. It is important to mention that the IETF draft describes a backward-compatible extension to RFC 3161, not a replacement. Precisely, a traditional timestamp is issued and then the blockchain transaction hash and proof are added to the timestamp token as a non-critical extension. The Guardtime approach, unlike most solutions using public blockchains, operates a proprietary KSI (Keyless Signature Infrastructure) blockchain first developed in 2008 for the Estonian Government. The keyless signature approach relies on hash functions rather than cryptographic keys, making it quantum-immune. The newest version does not use the RFC 3161 timestamp format, as the data structures involved are more complicated and public key cryptography is not used to directly sign timestamps (
https://m.guardtime.com/files/gt-ksi-tsa-gtsp3-v2.0-1.pdf, accessed on 20 September 2025). ANF AC operates as a QTSP across 28 EU member states. The company provides RFC 3161-compliant timestamping with proprietary blockchain infrastructure. According to ANF AC, the company operates an international infrastructure of servers functioning as Timestamp Units (TSUs), where each TSU manages a list of hash chains. The approach is similar to Intesi Group, in the sense that it is hybrid, using a classic RFC 3161-compliant solution with blockchain used to augment the timestamping process.
The enterprise implementations examined above, as summarized in the
Table 2, diverse approaches to integrating blockchain technology with timestamping services. While some providers, such as WordProof and Guardtime, have developed proprietary solutions that prioritize innovation over standards compliance, others like Intesi Group and ANF AC have pursued hybrid models that maintain RFC 3161 compatibility while adding blockchain anchoring as a supplementary security layer. These commercial deployments reveal a market trend toward leveraging blockchain’s immutability and transparency properties without completely abandoning established PKIs. However, the technical details of these implementations remain largely proprietary, and their approaches to balancing regulatory compliance with blockchain integration vary significantly. To gain deeper insight into the architectural patterns, security models, and technical trade-offs involved in blockchain-based timestamping, we now turn to the academic research literature, which provides more detailed analysis and empirical evaluation of various design approaches.
2.3. Relevant Research Literature
One of the earliest and most influential approaches to using blockchain technology for trusted timestamping is presented by Gipp, Meuschke, and Gernandt in “Decentralized Trusted Timestamping using the Cryptocurrency Bitcoin” [
14]. The authors propose a decentralized mechanism, called OriginStamp, which leverages the Bitcoin [
15] blockchain to store timestamping data in a tamper-proof and anonymous manner. In this system, a user can upload a digital document or directly submit its cryptographic hash. All client-side processing, like the generation of the document’s SHA-based hash, is performed locally, ensuring that sensitive data never leaves the user’s environment. On the server side, OriginStamp collects multiple hashes over a defined period, typically 24 h. Once a predefined threshold of submissions is reached, the hashes are concatenated and combined into a single aggregated hash. This aggregated hash is then converted into a valid Bitcoin address, to which the system transfers the smallest possible transaction amount. The resulting transaction is broadcast to the Bitcoin network and permanently stored within a block.
This approach significantly reduces transaction fees by grouping multiple user requests into a single blockchain transaction. However, for users requiring immediate confirmation, the system also allows for instant publication of individual hashes on the blockchain, at an additional cost. From an architectural standpoint, the method relies on the structure of the balanced Merkle tree, where transactions form the leaf nodes ensuring cryptographic integrity and immutability of the stored data. Overall, OriginStamp [
14] represents a practical blockchain-based alternative to conventional RFC 3161 [
2]. It demonstrates how public blockchains can be integrated as a globally verifiable, tamper-resistant time ledger without relying on centralized trust models. Nevertheless, the proposed approach also faces several limitations concerning its scalability, adaptability to existing enterprise workflows, and potential for global adoption.
Another blockchain-based timestamping approach is introduced by the paper [
16], which proposes a scheme that utilizes the immutability of blockchain ledgers to generate secure and verifiable timestamps. The approach aims to prevent both the back-dating and the forward-dating of digital files, ensuring the integrity and chronological authenticity of stored data. In traditional blockchain timestamping methods, the block’s embedded timestamp is typically used to determine when data was recorded. However, such timestamps are subject to inaccuracies caused by network delays. Chronos [
16] addresses this issue by designing a scheme that provides highly accurate and verifiable timestamps independent of these block-level inconsistencies. The proposed architecture consists of three core entities: the User, the Chronos Log Server, and an Authenticated Auditor. The User generates a digital file along with its corresponding cryptographic signature and then sends the pair to the Log Server. The Log Server integrates the received data into a Bitcoin transaction, effectively anchoring it into the blockchain. Once the transaction is confirmed and recorded, Chronos derives the file’s timestamp not directly from the block’s timestamp field but from the block height—a unique and sequential property of each block within the chain. Specifically, the system defines a time interval representing the moment when a file was created:
The time at which the previous block was appended to the blockchain indicates the earliest possible creation time of the file;
The time when the block containing the transaction is confirmed represents the latest possible creation time.
In summary, Chronos enhances conventional blockchain timestamping by addressing the problem of unreliable block timestamps and introducing a verifiable mechanism that guarantees precise temporal proofs. Building upon the foundations of the initial approach [
16], an improved system, referred to as Chronos+ [
17], was later introduced, aiming to improve efficiency and scalability in blockchain-based timestamping. This new design introduces a batch timestamping mechanism, allowing multiple user requests to be processed collectively rather than individually, thereby optimizing system throughput. The research further analyzes the temporal dynamics of data operations in cloud infrastructures and introduces the Window of Timestamping (WoT) as a performance indicator. This metric captures the elapsed time between the user’s initial request and the blockchain’s confirmation of the timestamp. Chronos+ [
17] focuses on minimizing this window to achieve a more responsive and dependable timestamping process. The proposed framework establishes a secure and efficient mechanism for timestamp generation by leveraging the Ethereum blockchain network. It integrates symmetric encryption techniques alongside the concept of the WoT to ensure both the confidentiality of stored data and the precision of the recorded timestamps.
A different approach was introduced in this article [
18], which proposes a timestamping model built directly on the Ethereum blockchain. The system is based on a decentralized mechanism that combines smart contracts with multiple independent time sources, rather than relying solely on the inherent block timestamps. Within this framework, users can request a timestamp by sending a transaction containing the data to a dedicated smart contract. Subsequently, a set of volunteer nodes submit their own timestamps, representing the exact moment when they detect that transaction. The contract then discards inconsistent reports and computes the most accurate timestamp by selecting the earliest consistent value among all submissions. This collaborative validation process enhances both accuracy and trust decentralization, as it mitigates the dependency on any single source of timestamping. Therefore, the closer the selected timestamp is to the actual time of the user’s request, the higher the precision and reliability of the generated timestamp. The process starts when a user sends a blockchain transaction to the smart contract containing the data that needs to be timestamped and a small fee to reward miners and providers. When the transaction appears on the network, several providers record the exact time they first see it and send this information back to the smart contract. The contract compares all received timestamps, selects the most accurate one, stores it permanently on the blockchain together with the data, and then shares the fees among the participating providers.
Several studies have highlighted that blockchain-based timestamping can achieve a purpose similar to that of TSA-issued timestamps, namely, providing evidence that data existed at a given point in time, while eliminating the need to trust a single centralized authority [
19]. Blockchains offer key advantages for this application: the distributed consensus mechanism ensures that the ledger is resistant to tampering and widely verifiable. However, relying solely on blockchain for timestamping presents certain limitations compared to qualified timestamps. One notable concern is the precision and trustworthiness of the timestamp itself. The granularity of block times, for example, Bitcoin’s 10 min interval, may be insufficient for applications that require highly precise temporal resolution [
19]. In contrast, a qualified TSA can anchor its timestamps to an official time source, providing accuracy at the level of seconds or better, along with a verifiable cryptographic audit trail of the time source, as mandated by relevant standards. Another limitation of blockchain-only approaches relates to legal recognition: at present, a hash recorded on a public blockchain does not automatically carry the same legal status as a qualified timestamp token. This shortcoming has motivated research into hybrid solutions that combine blockchain anchoring with qualified timestamping, aiming to leverage the strengths of both approaches [
19].
Recent studies illustrate the potential of blockchain-based timestamping as an alternative to traditional TSAs. The work [
20] presents a system for healthcare emergency events, where critical timestamps (e.g., ambulance dispatch; treatment times) are hashed and recorded on an Ethereum-compatible blockchain via smart contracts, removing reliance on a central authority. While no qualified TSA is used, the approach ensures immutable, transparent event records at low cost. The authors demonstrate that their approach maintains an auditable and tamper-resistant record of event times at relatively low cost, suggesting it could serve as an alternative to traditional trusted timestamp servers in similar operational contexts [
20]. Nevertheless, for applications and services requiring legal admissibility, integration with qualified trust services, such as a qualified TSA, remains necessary.
Recent bibliometric [
21] analyses acknowledge the increasing role of blockchain as a mechanism for ensuring data integrity in security-critical systems. The authors provide a large-scale survey of cryptographic techniques used to secure AI (Artificial Intelligence) systems and highlight that blockchain is frequently employed to guarantee tamper-resistant storage and transparent auditability in distributed environments. However, their study remains focused on trends in AI security and does not address digital services offered by TSPs. Across contemporary research efforts, the literature review [
22] offers a comprehensive analysis of publications on electronic voting security, highlighting trends in modern cryptography and the emerging use of blockchain for transparency and auditability. Their work identifies the cryptography primitives, thread models, and security trends shaping modern e-voting research. One of their main findings is the increasing reliance on blockchain and distributed ledger technologies as trust anchors, based on their transparency, immutability, and resistance to single point of failure attacks. The review highlights that blockchain has become a recurring component in security-sensitive systems, particularly where auditability and tamper-evidence are required.
The work presented in the paper [
23] proposes a blockchain-based timestamping framework for tracking AI model lifecycle events, highlighting the need for immutable and independently verifiable evidence. The system anchors cryptographic commitments of training, validation, and deployment artifacts on a blockchain network, eliminating the need for centralized component. The study provides strong motivation for blockchain adoption in security-sensitive audit environments and acknowledges the historic foundation of trusted timestamping defined in RFC 3161 [
2]. The article provides a valuable conceptual perspective on how blockchain-based anchoring can enhance trust in digital processes. In comparison, our work extends this direction of research by providing an implementation-ready, RFC 3161-compliant timestamping architecture together with practical experiments across multiple blockchain networks.
A recent contribution [
24] provides a legally oriented examination of blockchain-based timestamping, focusing on its applicability to digital evidence submission in judicial environments. The study combines a literature review, a statistical analysis, and simulation experiments on Ethereum and Hyperledger Fabric blockchain networks. The results highlight blockchain’s value in strengthening evidence authenticity, reducing reliance on centralized authorities. The paper positions blockchains as an auxiliary trust mechanism but also notes some adoption barriers such as regulatory uncertainty and the need for harmonized legal frameworks. Although the article offers an insightful legal analysis of blockchain-based timestamping, it remains largely conceptual and simulation-oriented. Our work complements this perspective by providing a fully specified architecture, concrete implementation, and reproducible experiments across Ethereum and Hyperledger Fabric networks. By detailing concrete components and processing flows, we provide a practical foundation for evaluating real-world performance and integration feasibility. This practical evaluation extends prior approaches b y demonstrating how blockchain anchoring can be integrated into a functioning timestamping service.
In summary, current studies indicate that combining blockchain technology with qualified timestamp authorities proposes an effective approach to improve both the trustworthiness and legal validity of timestamps. Blockchain ensures records are decentralized, tamper-proof, and long-lasting, while traditional TSAs provide accurate timekeeping and legal recognition. Recent research has investigated ways to leverage these complementary advantages together.
The research literature reviewed above and summarized in the
Table 3 presents a comprehensive view of blockchain-based timestamping approaches, ranging from purely decentralized systems like OriginStamp to hybrid models that attempt to balance blockchain immutability with traditional time source accuracy. While these academic contributions have advanced our understanding of distributed timestamping mechanisms, they collectively highlight a persistent tension between innovation and standardization. Solutions that prioritize decentralization and cost efficiency often sacrifice RFC 3161 compliance and legal recognition, while approaches that maintain compatibility with existing standards typically do not fully leverage blockchain’s transparency and auditability properties. Furthermore, most research implementations focus on proof-of-concept demonstrations rather than production-ready systems that address the operational, security, and governance requirements necessary for deployment in regulated environments. This analysis of both academic research and commercial implementations reveals specific gaps and opportunities that our proposed architecture aims to address.
2.4. Gaps and Opportunities
Some of the blockchain-based timestamping approaches analyzed in the previous section, [
14,
16,
17,
18,
20], share several limitations, with the following two considered particularly notable:
Absence of a trusted TSA: None of the systems rely on a traditional Time-Stamping Authority (TSA) to sign the timestamps. Therefore, the trustworthiness of the timestamp depends solely on the blockchain component. This introduces issues regarding the reliability and verifiability of the timestamp and also reduces interoperability with existing trusted timestamping infrastructures and public key infrastructures (PKIs);
Non-compliance with RFC 3161: All four solutions do not fully adhere to established timestamping standards, which could reduce compatibility with systems expecting RFC-compliant timestamps.
When analyzing the limitations specific to each solution, further distinctions emerge. In the case of OriginStamp [
14], while batching requests reduces transaction costs, it also introduces significant delays in recording individual hashes unless users pay additional fees. Also, the timestamp accuracy is limited by Bitcoin’s block interval (approximately 10 min) and the batching mechanism (typically 24 h aggregation). While the system records the time per transaction, it does not provide a precise timestamp for each individual hash, making it unclear exactly when a specific hash was received and processed on the server side. The blockchain relies on a Proof-of-Work consensus, where a new transaction block is added only after a node successfully solves a complex cryptographic puzzle. This process introduces unpredictable delays in timestamping, as the exact confirmation time depends on how long it takes to validate and append the block. Additionally, if an immediate timestamp is required, such as for financial transactions, this delay can pose a significant challenge. Additionally, maintaining security against 51% attacks where an attacker controls the majority of validation nodes requires a large and widely distributed network of active nodes.
Regarding the proposed scheme in the Cronos [
16] article, this can pose a security concern in certain scenarios, as the exact creation time is not unique. Ideally, a single, precise timestamp should be used. Chronos++ [
17] improves upon the original by supporting batch timestamping and optimizing the Window of Timestamping (WoT). However, there still exists a delay between a user’s request and the final blockchain confirmation. Related to the proposed solution in the paper [
18], timestamp accuracy depends on how quickly volunteers report the transaction time. Insufficient participation or reporting delays can reduce precision. Moreover, coordinating multiple time sources increases system complexity and may present potential vulnerabilities if selection strategies are not robust.
Despite the limitation highlighted above, all the analyzed solutions have introduced significant improvements in the field of blockchain-based timestamping and have highlighted clear research directions. Each of the proposals contributed innovative mechanisms for securing timestamps, optimizing processing, and addressing decentralization challenges. However, there remain opportunities for further enhancement, which this work aims to address:
Implement a blockchain-based timestamping solution that is fully compliant with existing cryptographic standards and RFCs, such as RFC 3161 [
2] and RFC 5816 [
6];
Integrate a trusted TSA (Time-Stamping Authority) to sign the timestamps, providing interoperability with current PKI-based systems;
Ensure that timestamps are universally verifiable and can be more broadly adopted;
Bridge the gap between decentralized blockchain-based timestamping and traditional trusted timestamping infrastructures.