Abstract
It is a desirable feature in a public key infrastructure (PKI) to include the signature information in a printed do ument for authenticity and integrity cheks, in a way to bind an eletronic doument to the printed document. However, it is not easy to preserve the digital signature in the printed doument be a use the digital signature is for the text code (or the whole doument file),not for the text image (which can be sanned optically) in printed form. So, we propose a practical and secure method for preserving the authorized digital signatures for printed do uments. We will derive a printable digital signature scheme from the Korean Certificate-based Digital Signature Algorithm (KCDSA)for secure transaction and utilize the dense two-dimensional barcode, QRcode, for printing out the signature and data in a small area within a printed doument.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
H.E. Burke, “Handbook of bar Coding Systems,” Van Nostrand Reinhold, New York,N.Y., 1984.
T. Kwon, “Digital signature algorithm for securing digital identities,” Information Processing Letters, Vol. 82, Iss. 5, pp. 247–252, May 2002. 465
C. Lim, “A study on the proposed Korean digital signature algorithm,” Advances in Cryptology-ASIACRYPT’98, LNCS 1514, Spinger-Verlag, pp. 175–186, 1998. 466,471,473
S. Lin and D.J. Costello Jr., “Error Control Coding,Fundamentals and Applications,” Prentice Hall, Englewoo Cliffs,N.J., 1983.
A. Longacre, Jr., “Stacked Bar Code Symbologies,” Identification J., Vol. 11, No. 1, Jan./Feb., pp. 12–14, 1989.
M. Michels, D. Naccache and H. Pertersen, “GOST 34.10-A brief overview of Russia’s DSA,” Computer Security, Vol. 15, No.8, pp. 725–732, 1996. 471
NIST, “Digital signature standard,” Federal Information Processing Standards Publication 186, 1994.
Roger.C. Palmer, “The Bar Code Book,” Helmers Publishing, Peterborough, N.H., 3rd Ed., 1995. 465,474
Theo Pavlidis, Jerome Swartz, and Ynjiun P. Wang, “Fundamentals of Bar Code Information Theory,” IEEE Computer, Vol. 23, No. 4, pp. 74–86, April 1990.
Y.P. Wang and T. Pavlidis, “Optimal Correspondence of String Subsequences,” IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. PAMI-12, No. 11, pp. 1080–1087, Nov. 1990.
Y.P. Wang, “PDF417 Specification,” Symbol Technologies, Boemia,N.Y., 1991
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, Ji., Kwon, T., Song, S., Song, J. (2003). A Model for Embedding and Authorizing Digital Signatures in Printed Documents. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_32
Download citation
DOI: https://doi.org/10.1007/3-540-36552-4_32
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00716-6
Online ISBN: 978-3-540-36552-5
eBook Packages: Springer Book Archive