Abstract
The trusted presentation of the signed or being signed data is one of the key problem, which should be solved in so called secure signature creation and verification devices. Such presentation (in literature respectively known as a What You See Is What You Sign (WYSIWYS) and What You See Was Signed (WYSWS) problems) is the crucial issue especially in distributed environment. The trust assigned to various elements of such environment is limited so the participation of the commonly accepted Trusted Party (TP) operating on-line is the solution of that problem [1, 2]. The paper contains proposal of some modification of the secure signature creation and verification protocol, which was presented by W. Chocianowicz, et al. [1, 2]. The modification is made in the part related to the trusted presentation of the data, which should be signed by the signer or validated by the verifier. The modification is based on the visual cryptography methods allowing the human to verify the authenticity of the data being signed or signed, without any knowledge of cryptography, cryptographic computations, or computational devices.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
W. Chocianowicz, J. Pejaś, A. Ruci≁ski The Proposal of Protocol for Electronic Signature Creation in Public Environment, in Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, Springer New York 2005
W. Chocianowicz, J. Pejaś, A. Ruci≁ski Problems of trusted presentation the data to be signed and verified (in polish), VII Krajowa Konferencja Zastosowa≁ Kryptografii ENIGMA’2004, Warszawa, May 2004
A. Spalka, A.B. Cremers, H. Langweg Trojan Horse Attacks on Software for Electronic Signatures, Informatica 26 (2002) 191-203 pp.191-204
M. Naor, A. Shamir Visual Cryptography, in Advances in Cryptology - Eurocrypt ‘94, A. De Santis ed., Lecture Notes in Computer Science, Springer-Verlag Berlin, 1994, pp. 1-12
M. Krause, H. U. Simon Determining the Optimal Contrast for Secret Sharing Schemes in Visual Cryptography, Electronic Colloquium on Computational Complexity, ECCC Reports 2000, Report TR00-003, ISSN 1433-8092
G. Ateniese, C. Blundo, A. De Santis, D. R. Stinson Visual Cryptography for General Access Structures, Electronic Colloquium on Computational Complexity (ECCC), 1996
L. W. Hawkes, Alec Yasinsac, C. Cline An Application of Visual Cryptography To Financial Documents, The Florida State University, College of Arts and Sciences Department of Computer Science Research, TR-001001, 2000
P. A. Eisen, D. R. Stinson Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels, Designs, Codes and Cryptography, Springer Netherlands, vol. 25, No 1, January 2002
M. Naor, B. Pinkas Visual Authentication and Identification, in Advances in Cryptology - CRYPTO ‘97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 1997, Lecture Notes in Computer Science, Springer-Verlag Berlin, 1997
M. Nakajima, Y. Yamaguchi Extended Visual Cryptography for Natural Images, Journal of WSCG, Vol.10, No.2, 2002
ETSI TR 102 203 Mobile Commerce (M-COMM) - Mobile Signatures - Business and Functional Requirements, V1.1.1 (2003-05), Technical Report
Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, Official Journal of the European Communities, 19.1.2000
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this paper
Cite this paper
Pejaś, J., Zawalich, M. (2007). Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems. In: Pejaś, J., Saeed, K. (eds) Advances in Information Processing and Protection. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73137-7_20
Download citation
DOI: https://doi.org/10.1007/978-0-387-73137-7_20
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-73136-0
Online ISBN: 978-0-387-73137-7
eBook Packages: Computer ScienceComputer Science (R0)