Advertisement

Efficient Authentication of Electronic Document Workflow

  • Yongdong Wu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3822)

Abstract

In the history of document circulation, many participants may annotate and sign on the document so as to produce a final authentic document. This circulation process requires that a later participant can know the document circulation history, verify all the previous annotations, but can not modify them. To be applicable to devices of limited resources, the document processing approach should be efficient in terms of computational cost and network overhead. This paper extends an aggregate signature scheme so as to combine many signatures into one no matter which kind of circulating route (sequential, parallel, or hybrid) is. Since the proposal enables to manage the documents easily, it is useful and practical in office automation applications.

Keywords

Signature Scheme Communication Overhead Individual Signature Modular Multiplication Electronic Document 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Atluri, V., Bertino, E., Ferrari, E., Mazzoleni, P.: Supporting Delegation in Secure Workflow Management Systems. In: IFIP WG 11.3 Conference on Data and Application Security, pp. 199–212 (2003)Google Scholar
  2. 2.
    Atluri, V., Chun, S., Mazzoleni, P.: A Chinese Wall Security Model for Decentralized Workflow Systems. In: 8th ACM Conference on Computer and Communication Security, pp. 48–57 (2001)Google Scholar
  3. 3.
    Atluri, V., Huang, W.-K.: Enforcing Mandatory and Discretionary Security in Workflow Management Systems. J. of Computer Security 5(4), 303–339 (1997)Google Scholar
  4. 4.
    Yuichi, M., Kazuhiro, S.: Digitised document circulating system with circulation history. US patent No. 5,767,847 (1998)Google Scholar
  5. 5.
    Prinz, W.: Two Complementary Tools for the Co-operation in a Ministerial Environment. Journal of Universal Computing Science, 843–864 (1997)Google Scholar
  6. 6.
    Kenjiro, M., Toshiro, N.: Method of editing and circulating an electronic draft document amongst reviewing persons at remote terminals attached to a local area network. US patent No. 5,040,142 (1991)Google Scholar
  7. 7.
    Hiroshi, M., Kazuo, T.: Electronic document processing system and method of forming digital signature. US patent No. 5,465,299 (1995)Google Scholar
  8. 8.
    Shieh, S.-P., Lin, C.-T., Yang, W.-B., Sun, H.-M.: Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems. IEEE Trans. on Vehicular Technology 49(4), 1464–1473 (2000)CrossRefGoogle Scholar
  9. 9.
    Yi, X., Siew, C.K.: Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Trans. on Vehicular Technology 51(6), 1313–1315 (2002)CrossRefGoogle Scholar
  10. 10.
    Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Zhu, H., Bao, F., Li, T., Wu, Y.: Constructing Sequential Aggregate Signatures for Secure Wireless Routing Protocols. In: IEEE WCNC (2005)Google Scholar
  12. 12.
    National Institure of Standards and Technology, “Secure Hash Standard (SHS)”, FIPS Publication 180-1 (1995)Google Scholar
  13. 13.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Comm. of the ACM 21(2), 120–126 (1978)zbMATHCrossRefMathSciNetGoogle Scholar
  14. 14.
    National Institure of Standards and Technology. Proposed Federal Information Processing Standard for Digital Signature Standard (DSS), Federal Register, 56(169), 42980-42982 (1991)Google Scholar
  15. 15.
    Shparlinski, I.E.: Finite Fields: Theory and Computation, pp. 215–239. Kluwer Academic Publishers, Dordrecht (1999) (ISBN 0-7923-5662-4)zbMATHGoogle Scholar
  16. 16.
    Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  17. 17.
    Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: NDSS (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Yongdong Wu
    • 1
  1. 1.Information Security LabInstitute for Infocomm ResearchSingapore

Personalised recommendations