Efficient Authentication of Electronic Document Workflow
In the history of document circulation, many participants may annotate and sign on the document so as to produce a final authentic document. This circulation process requires that a later participant can know the document circulation history, verify all the previous annotations, but can not modify them. To be applicable to devices of limited resources, the document processing approach should be efficient in terms of computational cost and network overhead. This paper extends an aggregate signature scheme so as to combine many signatures into one no matter which kind of circulating route (sequential, parallel, or hybrid) is. Since the proposal enables to manage the documents easily, it is useful and practical in office automation applications.
KeywordsSignature Scheme Communication Overhead Individual Signature Modular Multiplication Electronic Document
Unable to display preview. Download preview PDF.
- 1.Atluri, V., Bertino, E., Ferrari, E., Mazzoleni, P.: Supporting Delegation in Secure Workflow Management Systems. In: IFIP WG 11.3 Conference on Data and Application Security, pp. 199–212 (2003)Google Scholar
- 2.Atluri, V., Chun, S., Mazzoleni, P.: A Chinese Wall Security Model for Decentralized Workflow Systems. In: 8th ACM Conference on Computer and Communication Security, pp. 48–57 (2001)Google Scholar
- 3.Atluri, V., Huang, W.-K.: Enforcing Mandatory and Discretionary Security in Workflow Management Systems. J. of Computer Security 5(4), 303–339 (1997)Google Scholar
- 4.Yuichi, M., Kazuhiro, S.: Digitised document circulating system with circulation history. US patent No. 5,767,847 (1998)Google Scholar
- 5.Prinz, W.: Two Complementary Tools for the Co-operation in a Ministerial Environment. Journal of Universal Computing Science, 843–864 (1997)Google Scholar
- 6.Kenjiro, M., Toshiro, N.: Method of editing and circulating an electronic draft document amongst reviewing persons at remote terminals attached to a local area network. US patent No. 5,040,142 (1991)Google Scholar
- 7.Hiroshi, M., Kazuo, T.: Electronic document processing system and method of forming digital signature. US patent No. 5,465,299 (1995)Google Scholar
- 11.Zhu, H., Bao, F., Li, T., Wu, Y.: Constructing Sequential Aggregate Signatures for Secure Wireless Routing Protocols. In: IEEE WCNC (2005)Google Scholar
- 12.National Institure of Standards and Technology, “Secure Hash Standard (SHS)”, FIPS Publication 180-1 (1995)Google Scholar
- 14.National Institure of Standards and Technology. Proposed Federal Information Processing Standard for Digital Signature Standard (DSS), Federal Register, 56(169), 42980-42982 (1991)Google Scholar
- 17.Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: NDSS (2004)Google Scholar