ABSTRACT
The growing advantage of digital signature has raised an increasing interest in government entities as well as in enterprises to integrate digital signature within their workflows specially with the Egyptian government plans of digital transformation, however this transformation is faced by many challenges, in this paper we will focus on two of the main technical challenges and threats facing digital signature systems the first challenge is offline environments , some government entities and highly secured facilities enforce security regulations that prevent users from having access to the internet , that is a huge challenge when it comes to digital signature validation. Another challenge is the lack of a technically viable way to determine the exact time- of the digital signature creation with accurate precision. This paper is an approach for addressing these two problems [1].
- Pooja, Mamta Y., and Mamta Yadav. "Digital Signature." International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT) 3.6 (2018): 71-75.Google Scholar
- Electronic Authentication in the U.S. Federal Government Bill Burr, Manager Security Technology, National Institute of Standards and technology, Asia PKI Forum, Tokyo, February 2005 http://asia-pkiforum.org/feb_tokyo/NIST_Burr.pdfGoogle Scholar
- ETSI. Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES). ETSI Technical Specification TS, 2008.Google Scholar
- Kerry, Cameron F., and Patrick D. Gallagher. "Digital signature standard (DSS)." FIPS PUB (2013): 186-4. http://people.csail.mit.edu/alinush/6.857-spring-2015/papers/dsa.pdfGoogle Scholar
- Buccafurri, Francesco, Gianluca Caminiti, and Gianluca Lax. "Fortifying the dalì attack on digital signature." Proceedings of the 2nd International Conference on Security of Information and Networks. 2009.Google Scholar
- Bleichenbacher D., Joye M., Quisquater JJ. (1997) A new and optimal chosen-message attack on RSA-type cryptosystems. In: Han Y., Okamoto T., Qing S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028486Google ScholarCross Ref
- What is the eIDAS Regulation? Article by UK information commissioner office https://ico.org.uk/for-organisations/guide-to-eidas/what-is-the-eidas-regulation/Google Scholar
- Axel Eggert (2006) Intangibility and Perceived Risk in Online Environments, Journal of Marketing Management, 22:5-6, 553-572, DOI: 10.1362/026725706777978668Google ScholarCross Ref
- Cisbani, Emanuele, Chaining up Time: Bitcoin and Long-Term Validity of PKI Timestamp Tokens (August 25, 2020). Available at SSRN: https://ssrn.com/abstract=3743330 or http://dx.doi.org/10.2139/ssrn.3743330Google ScholarCross Ref
- Egyptian Ministry of Communication and Information Technology Resolution No. 236 of 2020 amending the executive regulations of Law No. 15 of 2004 regulating electronic signature and establishing the Information Technology Industry Development Agency https://itida.gov.eg/English/Documents/3.pdfGoogle Scholar
- Ross, J. "Network Working Group D. Pinkas Request for Comments: 5126 Bull SAS Obsoletes: 3126 N. Pope Category: Informational Thales eSecurity." (2008). https://datatracker.ietf.org/doc/html/rfc5126Google Scholar
- Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N. & Schwenk, J., (2019). Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In: Roßnagel, H., Wagner, S. & Hühnlein, D. (Hrsg.), Open Identity Summit 2019. Gesellschaft für Informatik, Bonn. (S. 95-106). https://dl.gi.de/bitstream/handle/20.500.12116/20997/proceedings-08.pdfGoogle Scholar
Index Terms
- Offline Digital Signature Validation Model with Enhanced Time-Stamping
Recommendations
Self-Generated-Certificate Digital Signature
ICGEC '10: Proceedings of the 2010 Fourth International Conference on Genetic and Evolutionary ComputingCertificate less Public Key Cryptography (CLPKC) as a new paradigm was introduced by Al-Riyami and Paterson in Asia crypt 2003, which removes the use of certificate to ensure the authenticity of the user’s public key in the traditional certificate-based ...
Public-Key encryption from ID-Based encryption without one-time signature
OTM'06: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part IDesign a secure public key encryption scheme and its security proof are one of the main interests in cryptography In 2004, Canetti, Halevi and Katz [8] constructed a public key encryption (PKE) from a selective identity-based encryption scheme with a ...
Digital Signature
ICCS '12: Proceedings of the 2012 International Conference on Computing SciencesThere are different types of encryption techniques are being used to ensure the privacy of data transmitted over internet. Digital Signature is a mathematical scheme which ensures the privacy of conversation, integrity of data, authenticity of digital ...
Comments