Advertisement

Legal Security for Transformations of Signed Documents: Fundamental Concepts

  • Andreas U. Schmidt
  • Zbyněk Loebl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3545)

Abstract

Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In particular, digital signatures of originals break depriving documents of probative force. This report elucidates legal problems, and introduces fundamental concepts of legally secure document transformations in a deliberately generic, application-independent way. A process analysis of transformations of signed documents is carried out to elicit common security requirements. This leads to the solution approach transformation seal, a cryptographically secured container used to ensure legal security for transformed documents by securing the content’s integrity, attesting a transformation’s correctnes, and attributing it to a responsible party.

Keywords

Electronic Signature Civil Code Electronic Document Data Message Paper Document 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    The UNCITRAL Model Law on Electronic Commerce, www.uncitral.org/english/texts/electcom/ml-ecomm.html
  2. 2.
    Guide to Enactment of the UNCITRAL Model Law on Electronic Commerce, www.uncitral.org/english/texts/electcom/ml-elecsig-e.pdf
  3. 3.
    Website of the TransiDoc project, www.transidoc.de
  4. 4.
    Long-Term Archiving and Notary Services Working Group of the IETF, ietf.org/html.charters/ltans-charter
  5. 5.
    Wallace, C., Chokhani, S.: Trusted archive protocol (TAP) IETF Internet draft (2003), www.ietf.org/internet-drafts/draft-ietf-pkix-tap-00.txt
  6. 6.
    Landrock, P., Pedersen, T.: WYSIWYS? What you see is what you sign? Information Security Technical Report 3, 55–61 (1998)CrossRefGoogle Scholar
  7. 7.
    Schmidt, A.U.: Signiertes XML und das Präsentationsproblem. Datenschutz und Datensicherheit 24, 153–158 (2000)Google Scholar
  8. 8.
    Website of the European Bridge CA project, http://www.bridge-ca.de
  9. 9.
    Ansper, A., Buldas, A., Roos, M., Willemson, J.: Efficient long-term validation of digital signatures. In: Proceedings of 4th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2001), Korea, pp. 402–415 (2001)Google Scholar
  10. 10.
    Dumortier, J., van den Eynde, S.: Electronic signatures and trusted archival services. In: Proceedings of the DLMForum 2002, Barcelona, Luxembourg, Office for Official Publications of the European Communities, May 6–8, pp. 520–524 (2002)Google Scholar
  11. 11.
    Lekkas, D., Gritzalis, D.: Cumulative notarization for long-term preservation of digital signatures. Computers & Security 23, 413–424 (2004)CrossRefGoogle Scholar
  12. 12.
    Website of the ArchiSig project, www.archisig.de

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Andreas U. Schmidt
    • 1
  • Zbyněk Loebl
    • 2
  1. 1.Fraunhofer Institute for Secure Information Technology SITDarmstadtGermany
  2. 2.Central European Advisory GroupPrague 1Czech Republic

Personalised recommendations