Skip to main content
Log in

A Hierarchical Extraction Policy for content extraction signatures

Selectively handling verifiable digital content

  • Regular contribution
  • Published:
International Journal on Digital Libraries Aims and scope Submit manuscript

Abstract

Content extraction signatures (CES) enable the selective disclosure of verifiable content from signed documents. We have previously demonstrated a CES Extraction Policy for fragment grouping to allow the document signer to designate which subsets of the original document are valid subdocuments. Extending this ability, we introduce a new Hierarchical Grouping Extraction Policy that is more powerful, and for which the encoding is dramatically smaller, than the existing Grouping Extraction Policy. This new Extraction Policy maps naturally onto the hierarchically structured documents commonly found in digital libraries. After giving a motivating example involving digital libraries we then conjecture as to how to enrich their functionality through the use of CESs. We also show how to implement the new extraction policy using XML signatures with a custom transform along with an improved design for the XML signature structure in order to achieve CES functionality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bartel M, Boyer J, Fox B, LaMacchia B, Simon E (2002) XML-signature syntax and processing. In: Eastlake D, Reagle J, Solo D (eds) W3C Recommendation. World Wide Web Consortium, 12 February 2002. http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/. Last accessed: 21 May 2004

  2. Bellare M, Neven G (2002) Transitive signatures based on factoring and RSA. In: Zheng Y (ed) Proc. 8th international conference on the theory and application of cryptology and information security (ASIACRYPT 2002), Queenstown, New Zealand, 1–5 December 2002. Lecture notes in computer science, vol 2501. Springer, Berlin Heidelberg New York, pp 397–414

  3. Berners-Lee T, Fielding R, Masinter L (1998) RFC 2396. Uniform resource identifiers (URI): generic syntax. Available online, August 1998. http://www.ietf.org/rfc/rfc2396.txt. Last accessed: 21 May 2004

  4. Beth T, Frisch M, Simmons GJ (eds) (1992) In: Public-key cryptography: state of the art and future directions, 3–6 July 1992. EISS Workshop Oberwolfach Final Report. Lecture notes in computer science, vol 578. Springer, Berlin Heidelberg New York

  5. Blakley GR (1999) Twenty years of cryptography in the open literature. In: Proc. 1999 IEEE symposium on security and privacy, Oakland, CA, 9–12 May 1999. IEEE Press, New York, pp 106–107

  6. Brands SA (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press, Cambridge, MA

  7. Brands S (1993) Privacy-protected transfer of electronic information. U.S. Patent serial no. 5,604,805 , February 1997, August 1993. Filed August

  8. Brands S (2002) A technical overview of digital credentials. http://www.credentica.com/technology/overview.pdf. Last accessed: 18 February 2003

  9. Bull L, McG Squire D, Newmarch J, Zheng Y (2003) Grouping verifiable content for selective disclosure. In: Safavi-Naini R, Seberry J (eds) Proc. 8th Australasian conference on information security and privacy (ACISP 2003), Wollongong, Australia, 9–11 July 2003. Lecture notes in computer science, vol 2727. Springer, Berlin Heidelberg New York, pp 1–12

  10. Bull L, Stanski P, McG Squire D (2003) Content extraction signatures using XML digital signatures and custom transforms on-demand. In: Proc. 12th international World Wide Web conference (WWW2003), Budapest, Hungary, 20–24 May 2003. ACM Press, New York, pp 170–177. http://www2003.org/cdrom/papers/refereed/p838/p838-bull.html. Last accessed: 21 May, 2004

  11. Devanbu PT, Gertz M, Kwong A, Martel C, Nuckolls G, Stubblebine SG (2001) Flexible authentication of XML documents. In: Proc. 8th ACM conference on computer and communications security, Philadelphia. ACM Press, New York, pp 136–45

  12. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory IT-22(6):644–54

    Article  MathSciNet  MATH  Google Scholar 

  13. Freed N, Borenstein N (1996) Multipurpose Internet mail extensions (MIME). I. Format of Internet message bodies. Available online, 1996. http://www.ietf.org/rfc/rfc2045.txt. Last accessed: 21 May 2004

  14. IETF (2004) The Internet Engineering Task Force. http://www.ietf.org/. Last accessed: 21 May 2004

  15. Johnson R, Molnar D, Song D, Wagner D (2002) Homomorphic signature schemes. In: Preneel B (ed) Topics in Cryptology – CT-RSA 2002: the cryptographer’s track at the RSA conference 2002, San Jose, CA, 18–22 February 2002. Lecture notes in computer science, vol 2271. Springer, Berlin Heidelberg New York, pp 244–62

  16. LaMacchia B, Lange S, Lyons M, Martin R, Price K (2002) .NET framework security. Addison-Wesley, Boston, MA

  17. Micali S, Rivest RL (2002) Transitive signature schemes. In: Preneel B (ed) Topics in Cryptology – CT-RSA 2002: the cryptographer’s track at the RSA Conference 2002, San Jose, CA, 18–22 February. Lecture notes in computer science, vol 2271. Springer, Berlin Heidelberg New York, pp 236–243

  18. NIST (1994) Digital Signature Standard (DSS). Number 186 in Federal Information Processing Standards publication. National Institute of Standards and Technology, May 1994. http://www.itl.nist.gov/fipspubs/fip186.htm. Last accessed: 7 April 2004

  19. Polivy DJ, Tamassia R (2002) Authenticating distributed data using web services and XML signatures. In: Proc. 2002 ACM workshop on XML security (XMLSEC-02), New York, 22 November 2002. ACM Press, New York, pp 80–89

  20. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–8

    Article  MathSciNet  MATH  Google Scholar 

  21. Steinfeld R, Bull L, Zheng Y (2001) Content extraction signatures. In: Kim K (ed) Proc. 4th international conference on information security and cryptology (ICISC 2001), Seoul, Korea, 6–7 December 2001. Lecture notes in computer science, vol 2288. Springer, Berlin Heidelberg New York, pp 285–304

  22. World Wide Web Consortium (2004) The World Wide Web Consortium. Available online. http://www.w3.org/ Last accessed: 21 May 2004

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laurence Bull.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bull, L., McG. Squire, D. & Zheng, Y. A Hierarchical Extraction Policy for content extraction signatures. Int J Digit Libr 4, 208–222 (2004). https://doi.org/10.1007/s00799-004-0082-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00799-004-0082-z

Keywords

Navigation