Abstract
Digital signatures are used for integrity of the signed media and authentication of the signers in digital environment. Beyond these the signature might provide an authorization service for a verifier to check whether the signer has license to sign the document in workflow. This verification is important in case of exchanging valuable documents between different organizational levels and also crucial in digital document archive. In this work, the necessity of signature authorization was described and also implementation of the authorization with X.509 based templates in hierarchical organizations was expressed. Also, a license structure for digital signature and a framework where signatures realize authorization of the signers on a document in hierarchical organization structure were proposed.
Supported by The Scientific and Technological Research Council of Turkey (TÃœBÄ°TAK), The Support Program for Scientific and Technological Research Projects (No. 108E132).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundamentals E79-A(9) (1996)
Wang, G., Bao, F., Zhou, J., Deng, R.H.: Security Analysis of Some Proxy Signatures. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 305–319. Springer, Heidelberg (2004)
Wang, G.: Designated-Verifier Proxy Signature Schemes. In: IFIP/ SEC 2005, pp. 409–423. Springer, Heidelberg (2005)
Chaum, D., Antwerpen, H.V.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–217. Springer, Heidelberg (1990)
Pedersen, T.P.: Distributed provers with applications to undeniable signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 221–242. Springer, Heidelberg (1991)
Saednia, S., Kremer, S., Markowitch, O.: An efficient strong designated verifier signature scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004)
Steinfeld, R., Bull, L., Wang, H., Piperzyk, J.: Universal Designated-Verifier Signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 523–542. Springer, Heidelberg (2003)
Ogata, W., Kurosawa, K., Heng, S.-H.: The Security of the FDH Variant of Chaum’s Undeniable Signature Scheme. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 328–345. Springer, Heidelberg (2005)
Ugur, A., Sogukpinar, I.: A Framework for Licensed Digital Signatures. In: The First International Workshop on Network & Communications Security Co-l.w Netcom 2009, Chennai, India, December 27-29 (2009)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.K.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001)
Paterson, K.G.: ID-based signatures from pairings on elliptic curves. IEEE Communications Letters 38(18), 1025–1026 (2002)
Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)
Lin, C.-Y., Wu, T.-C., Zhang, F., Hwang, J.-J.: New identity-based society oriented signature schemes from pairings on elliptic curves. Applied Mathematics and Computing 160 (2005)
Jin, W., Li, D., Li, Q., Xi, B.: Constructing Role-Based Access Control and Delegation Based on Hierarchical IBS. In: IFIP NPC Workshop (2007)
Lui Richard, W.C., Hui Lucas, C.K., Yiu, S.M.: Delegation with supervision. Information Sciences 177(19), 4014–4030 (2007)
Ugur, A., Sogukpinar, I.: A New Hierarchical Signature Scheme with Authorization, ISCTurkey (2007)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC 5280. IETF (May 2008)
Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Pearson Ed., London (2006)
Adams, C., Lloyd, S.: Understanding PKI Concepts, Standards, and Deployment Considerations, 2nd edn. Addison Wesley, Reading (2003)
Li, C., Yang, C., Cheung, R.: Key Management for Role Hierarchy in Distributed Systems. Journal of Network and Comp. Applications 30, 920–936 (2007)
An Internet Attribute Certificate Profile for Authorization, RFC 3281, IETF (2002)
Internet X.509 Public Key Infrastructure Subject Identification Method (SIM) (October 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ugur, A., Sogukpinar, I. (2010). An X.509 Based Licensed Digital Signature Framework for Hierarchical Organizations. In: Özcan, A., Chaki, N., Nagamalai, D. (eds) Recent Trends in Wireless and Mobile Networks. WiMo 2010. Communications in Computer and Information Science, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14171-3_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-14171-3_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14170-6
Online ISBN: 978-3-642-14171-3
eBook Packages: Computer ScienceComputer Science (R0)