Patent attributes
A digital signature is created for a data set based on a group of one-time secret keys. Revealable, representative values of the secret keys are computed, for example by cryptographic hashing, and an authentication code vector is also formed having elements that cryptographically combine each secret key with a randomizing function of the data set. The vector is timestamped and signed at a signing time. Bits of a binary representation of the signing time are used to select which of the secret values are included in a selected key vector. A signature of the digital data is then compiled to include the set of authentication code values, the signature of the authentication code vector, and the selected key vector. The secret keys thereby become unusable after the signing time.