Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework

  • Przemysław Kubiak
  • Mirosław Kutyłowski
  • Anna Lauks-Dutka
  • Michał Tabor
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 57)


We present an approach different from the classical framework of qualified electronic signatures that seem to offer much better properties regarding usability, costs, risk level as well as security in technical sense. Our approach is based on mediated signatures and chaining mechanisms that replace time stamping services.


electronic signature qualified signature mediator scheme chaining Merkle tree undeniability 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    European Parliament and of the European Council: Directive 1999/93/ec of the european parliament and of the council of 13 december, on a community framework for electronic signatures. Official Journal of the European Communities L(13) (19/1/2000) (1999)Google Scholar
  2. 2.
    European Parliament and of the Council of Europe: Directive 2006/123/ec of the european parliament and of the council of 12 december, on services in the internal market. Official Journal of the European Communities L(376) (27/12/2006) (2006)Google Scholar
  3. 3.
    Young, A., Yung, M.: An elliptic curve backdoor algorithm for RSASSA. In: Camenisch, J., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 355–374. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  4. 4.
    Council of Ministers of Poland: Regulation on determining the technical conditions of organization for qualified certification service providers, certification policies for qualified certificates issued by these entities and the technical conditions for secure devices for the submission and verification of electronic signatures. Dziennik Ustaw 128(1094) (7/07/2002)Google Scholar
  5. 5.
    Polish Parliament: Electronic signature act. Dziennik Ustaw 130(1450) (18/09/2001)Google Scholar
  6. 6.
    Young, A., Yung, M.: Cryptovirology: Extortion-based security threats and countermeasures. In: IEEE Symposium on Security and Privacy, pp. 129–140. IEEE Comp. Soc., Los Alamitos (1996)Google Scholar
  7. 7.
    Kucner, D., Kutyłowski, M.: Stochastic kleptography detection. In: Alster, K., Urbanowicz, J., Williams, H.C. (eds.) Public-key cryptography and computational number theory (Warsaw 2000), pp. 137–149. Walter de Gruyter Inc. (2001)Google Scholar
  8. 8.
    Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: Instantenous revocation of security capabilities. In: USENIX Security Symposium (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Przemysław Kubiak
    • 1
  • Mirosław Kutyłowski
    • 1
  • Anna Lauks-Dutka
    • 1
  • Michał Tabor
    • 2
  1. 1.Wrocław University of Technology 
  2. 2.Trusted Information Consulting, Warsaw 

Personalised recommendations