ICISC 2002: Information Security and Cryptology — ICISC 2002 pp 465-477 | Cite as
A Model for Embedding and Authorizing Digital Signatures in Printed Documents
Abstract
It is a desirable feature in a public key infrastructure (PKI) to include the signature information in a printed do ument for authenticity and integrity cheks, in a way to bind an eletronic doument to the printed document. However, it is not easy to preserve the digital signature in the printed doument be a use the digital signature is for the text code (or the whole doument file),not for the text image (which can be sanned optically) in printed form. So, we propose a practical and secure method for preserving the authorized digital signatures for printed do uments. We will derive a printable digital signature scheme from the Korean Certificate-based Digital Signature Algorithm (KCDSA)for secure transaction and utilize the dense two-dimensional barcode, QRcode, for printing out the signature and data in a small area within a printed doument.
Keywords
Computer Seurity Distribute Systems Seurity Practical AspectsPreview
Unable to display preview. Download preview PDF.
References
- [1]H.E. Burke, “Handbook of bar Coding Systems,” Van Nostrand Reinhold, New York,N.Y., 1984.Google Scholar
- [2]T. Kwon, “Digital signature algorithm for securing digital identities,” Information Processing Letters, Vol. 82, Iss. 5, pp. 247–252, May 2002. 465CrossRefMathSciNetGoogle Scholar
- [3]C. Lim, “A study on the proposed Korean digital signature algorithm,” Advances in Cryptology-ASIACRYPT’98, LNCS 1514, Spinger-Verlag, pp. 175–186, 1998. 466,471,473CrossRefGoogle Scholar
- [4]S. Lin and D.J. Costello Jr., “Error Control Coding,Fundamentals and Applications,” Prentice Hall, Englewoo Cliffs,N.J., 1983.Google Scholar
- [5]A. Longacre, Jr., “Stacked Bar Code Symbologies,” Identification J., Vol. 11, No. 1, Jan./Feb., pp. 12–14, 1989.Google Scholar
- [6]M. Michels, D. Naccache and H. Pertersen, “GOST 34.10-A brief overview of Russia’s DSA,” Computer Security, Vol. 15, No.8, pp. 725–732, 1996. 471CrossRefGoogle Scholar
- [7]NIST, “Digital signature standard,” Federal Information Processing Standards Publication 186, 1994.Google Scholar
- [8]Roger.C. Palmer, “The Bar Code Book,” Helmers Publishing, Peterborough, N.H., 3rd Ed., 1995. 465,474Google Scholar
- [9]Theo Pavlidis, Jerome Swartz, and Ynjiun P. Wang, “Fundamentals of Bar Code Information Theory,” IEEE Computer, Vol. 23, No. 4, pp. 74–86, April 1990.Google Scholar
- [10]Y.P. Wang and T. Pavlidis, “Optimal Correspondence of String Subsequences,” IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. PAMI-12, No. 11, pp. 1080–1087, Nov. 1990.CrossRefGoogle Scholar
- [11]Y.P. Wang, “PDF417 Specification,” Symbol Technologies, Boemia,N.Y., 1991Google Scholar