Skip to main content

A Model for Embedding and Authorizing Digital Signatures in Printed Documents

  • Conference paper
  • First Online:
Book cover Information Security and Cryptology — ICISC 2002 (ICISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2587))

Included in the following conference series:

Abstract

It is a desirable feature in a public key infrastructure (PKI) to include the signature information in a printed do ument for authenticity and integrity cheks, in a way to bind an eletronic doument to the printed document. However, it is not easy to preserve the digital signature in the printed doument be a use the digital signature is for the text code (or the whole doument file),not for the text image (which can be sanned optically) in printed form. So, we propose a practical and secure method for preserving the authorized digital signatures for printed do uments. We will derive a printable digital signature scheme from the Korean Certificate-based Digital Signature Algorithm (KCDSA)for secure transaction and utilize the dense two-dimensional barcode, QRcode, for printing out the signature and data in a small area within a printed doument.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. H.E. Burke, “Handbook of bar Coding Systems,” Van Nostrand Reinhold, New York,N.Y., 1984.

    Google Scholar 

  2. T. Kwon, “Digital signature algorithm for securing digital identities,” Information Processing Letters, Vol. 82, Iss. 5, pp. 247–252, May 2002. 465

    Article  MathSciNet  Google Scholar 

  3. C. Lim, “A study on the proposed Korean digital signature algorithm,” Advances in Cryptology-ASIACRYPT’98, LNCS 1514, Spinger-Verlag, pp. 175–186, 1998. 466,471,473

    Chapter  Google Scholar 

  4. S. Lin and D.J. Costello Jr., “Error Control Coding,Fundamentals and Applications,” Prentice Hall, Englewoo Cliffs,N.J., 1983.

    Google Scholar 

  5. A. Longacre, Jr., “Stacked Bar Code Symbologies,” Identification J., Vol. 11, No. 1, Jan./Feb., pp. 12–14, 1989.

    Google Scholar 

  6. M. Michels, D. Naccache and H. Pertersen, “GOST 34.10-A brief overview of Russia’s DSA,” Computer Security, Vol. 15, No.8, pp. 725–732, 1996. 471

    Article  Google Scholar 

  7. NIST, “Digital signature standard,” Federal Information Processing Standards Publication 186, 1994.

    Google Scholar 

  8. Roger.C. Palmer, “The Bar Code Book,” Helmers Publishing, Peterborough, N.H., 3rd Ed., 1995. 465,474

    Google Scholar 

  9. Theo Pavlidis, Jerome Swartz, and Ynjiun P. Wang, “Fundamentals of Bar Code Information Theory,” IEEE Computer, Vol. 23, No. 4, pp. 74–86, April 1990.

    Google Scholar 

  10. Y.P. Wang and T. Pavlidis, “Optimal Correspondence of String Subsequences,” IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. PAMI-12, No. 11, pp. 1080–1087, Nov. 1990.

    Article  Google Scholar 

  11. Y.P. Wang, “PDF417 Specification,” Symbol Technologies, Boemia,N.Y., 1991

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, Ji., Kwon, T., Song, S., Song, J. (2003). A Model for Embedding and Authorizing Digital Signatures in Printed Documents. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_32

Download citation

  • DOI: https://doi.org/10.1007/3-540-36552-4_32

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00716-6

  • Online ISBN: 978-3-540-36552-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics