Skip to main content

Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems

  • Conference paper
  • 404 Accesses

Abstract

The trusted presentation of the signed or being signed data is one of the key problem, which should be solved in so called secure signature creation and verification devices. Such presentation (in literature respectively known as a What You See Is What You Sign (WYSIWYS) and What You See Was Signed (WYSWS) problems) is the crucial issue especially in distributed environment. The trust assigned to various elements of such environment is limited so the participation of the commonly accepted Trusted Party (TP) operating on-line is the solution of that problem [1, 2]. The paper contains proposal of some modification of the secure signature creation and verification protocol, which was presented by W. Chocianowicz, et al. [1, 2]. The modification is made in the part related to the trusted presentation of the data, which should be signed by the signer or validated by the verifier. The modification is based on the visual cryptography methods allowing the human to verify the authenticity of the data being signed or signed, without any knowledge of cryptography, cryptographic computations, or computational devices.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. Chocianowicz, J. Pejaś, A. Ruci≁ski The Proposal of Protocol for Electronic Signature Creation in Public Environment, in Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, Springer New York 2005

    Google Scholar 

  2. W. Chocianowicz, J. Pejaś, A. Ruci≁ski Problems of trusted presentation the data to be signed and verified (in polish), VII Krajowa Konferencja Zastosowa≁ Kryptografii ENIGMA’2004, Warszawa, May 2004

    Google Scholar 

  3. A. Spalka, A.B. Cremers, H. Langweg Trojan Horse Attacks on Software for Electronic Signatures, Informatica 26 (2002) 191-203 pp.191-204

    MATH  Google Scholar 

  4. M. Naor, A. Shamir Visual Cryptography, in Advances in Cryptology - Eurocrypt ‘94, A. De Santis ed., Lecture Notes in Computer Science, Springer-Verlag Berlin, 1994, pp. 1-12

    Google Scholar 

  5. M. Krause, H. U. Simon Determining the Optimal Contrast for Secret Sharing Schemes in Visual Cryptography, Electronic Colloquium on Computational Complexity, ECCC Reports 2000, Report TR00-003, ISSN 1433-8092

    Google Scholar 

  6. G. Ateniese, C. Blundo, A. De Santis, D. R. Stinson Visual Cryptography for General Access Structures, Electronic Colloquium on Computational Complexity (ECCC), 1996

    Google Scholar 

  7. L. W. Hawkes, Alec Yasinsac, C. Cline An Application of Visual Cryptography To Financial Documents, The Florida State University, College of Arts and Sciences Department of Computer Science Research, TR-001001, 2000

    Google Scholar 

  8. P. A. Eisen, D. R. Stinson Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels, Designs, Codes and Cryptography, Springer Netherlands, vol. 25, No 1, January 2002

    Google Scholar 

  9. M. Naor, B. Pinkas Visual Authentication and Identification, in Advances in Cryptology - CRYPTO ‘97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 1997, Lecture Notes in Computer Science, Springer-Verlag Berlin, 1997

    Google Scholar 

  10. M. Nakajima, Y. Yamaguchi Extended Visual Cryptography for Natural Images, Journal of WSCG, Vol.10, No.2, 2002

    Google Scholar 

  11. ETSI TR 102 203 Mobile Commerce (M-COMM) - Mobile Signatures - Business and Functional Requirements, V1.1.1 (2003-05), Technical Report

    Google Scholar 

  12. Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, Official Journal of the European Communities, 19.1.2000

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this paper

Cite this paper

Pejaś, J., Zawalich, M. (2007). Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems. In: Pejaś, J., Saeed, K. (eds) Advances in Information Processing and Protection. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73137-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-73137-7_20

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-73136-0

  • Online ISBN: 978-0-387-73137-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics