A Model for Embedding and Authorizing Digital Signatures in Printed Documents

  • Jae-il Lee
  • Taekyoung Kwon
  • Sanghoon Song
  • Jooseok Song
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2587)

Abstract

It is a desirable feature in a public key infrastructure (PKI) to include the signature information in a printed do ument for authenticity and integrity cheks, in a way to bind an eletronic doument to the printed document. However, it is not easy to preserve the digital signature in the printed doument be a use the digital signature is for the text code (or the whole doument file),not for the text image (which can be sanned optically) in printed form. So, we propose a practical and secure method for preserving the authorized digital signatures for printed do uments. We will derive a printable digital signature scheme from the Korean Certificate-based Digital Signature Algorithm (KCDSA)for secure transaction and utilize the dense two-dimensional barcode, QRcode, for printing out the signature and data in a small area within a printed doument.

Keywords

Computer Seurity Distribute Systems Seurity Practical Aspects 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    H.E. Burke, “Handbook of bar Coding Systems,” Van Nostrand Reinhold, New York,N.Y., 1984.Google Scholar
  2. [2]
    T. Kwon, “Digital signature algorithm for securing digital identities,” Information Processing Letters, Vol. 82, Iss. 5, pp. 247–252, May 2002. 465CrossRefMathSciNetGoogle Scholar
  3. [3]
    C. Lim, “A study on the proposed Korean digital signature algorithm,” Advances in Cryptology-ASIACRYPT’98, LNCS 1514, Spinger-Verlag, pp. 175–186, 1998. 466,471,473CrossRefGoogle Scholar
  4. [4]
    S. Lin and D.J. Costello Jr., “Error Control Coding,Fundamentals and Applications,” Prentice Hall, Englewoo Cliffs,N.J., 1983.Google Scholar
  5. [5]
    A. Longacre, Jr., “Stacked Bar Code Symbologies,” Identification J., Vol. 11, No. 1, Jan./Feb., pp. 12–14, 1989.Google Scholar
  6. [6]
    M. Michels, D. Naccache and H. Pertersen, “GOST 34.10-A brief overview of Russia’s DSA,” Computer Security, Vol. 15, No.8, pp. 725–732, 1996. 471CrossRefGoogle Scholar
  7. [7]
    NIST, “Digital signature standard,” Federal Information Processing Standards Publication 186, 1994.Google Scholar
  8. [8]
    Roger.C. Palmer, “The Bar Code Book,” Helmers Publishing, Peterborough, N.H., 3rd Ed., 1995. 465,474Google Scholar
  9. [9]
    Theo Pavlidis, Jerome Swartz, and Ynjiun P. Wang, “Fundamentals of Bar Code Information Theory,” IEEE Computer, Vol. 23, No. 4, pp. 74–86, April 1990.Google Scholar
  10. [10]
    Y.P. Wang and T. Pavlidis, “Optimal Correspondence of String Subsequences,” IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. PAMI-12, No. 11, pp. 1080–1087, Nov. 1990.CrossRefGoogle Scholar
  11. [11]
    Y.P. Wang, “PDF417 Specification,” Symbol Technologies, Boemia,N.Y., 1991Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Jae-il Lee
    • 1
  • Taekyoung Kwon
    • 2
  • Sanghoon Song
    • 2
  • Jooseok Song
    • 3
  1. 1.Korea Information Security AgencySeoulKorea
  2. 2.Sejong UniversitySeoulKorea
  3. 3.Yonsei UniversitySeoulKorea

Personalised recommendations