skip to main content
10.1145/3634848.3634852acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsieConference Proceedingsconference-collections
research-article

Offline Digital Signature Validation Model with Enhanced Time-Stamping

Published:24 January 2024Publication History

ABSTRACT

The growing advantage of digital signature has raised an increasing interest in government entities as well as in enterprises to integrate digital signature within their workflows specially with the Egyptian government plans of digital transformation, however this transformation is faced by many challenges, in this paper we will focus on two of the main technical challenges and threats facing digital signature systems the first challenge is offline environments , some government entities and highly secured facilities enforce security regulations that prevent users from having access to the internet , that is a huge challenge when it comes to digital signature validation. Another challenge is the lack of a technically viable way to determine the exact time- of the digital signature creation with accurate precision. This paper is an approach for addressing these two problems [1].

References

  1. Pooja, Mamta Y., and Mamta Yadav. "Digital Signature." International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT) 3.6 (2018): 71-75.Google ScholarGoogle Scholar
  2. Electronic Authentication in the U.S. Federal Government Bill Burr, Manager Security Technology, National Institute of Standards and technology, Asia PKI Forum, Tokyo, February 2005 http://asia-pkiforum.org/feb_tokyo/NIST_Burr.pdfGoogle ScholarGoogle Scholar
  3. ETSI. Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES). ETSI Technical Specification TS, 2008.Google ScholarGoogle Scholar
  4. Kerry, Cameron F., and Patrick D. Gallagher. "Digital signature standard (DSS)." FIPS PUB (2013): 186-4. http://people.csail.mit.edu/alinush/6.857-spring-2015/papers/dsa.pdfGoogle ScholarGoogle Scholar
  5. Buccafurri, Francesco, Gianluca Caminiti, and Gianluca Lax. "Fortifying the dalì attack on digital signature." Proceedings of the 2nd International Conference on Security of Information and Networks. 2009.Google ScholarGoogle Scholar
  6. Bleichenbacher D., Joye M., Quisquater JJ. (1997) A new and optimal chosen-message attack on RSA-type cryptosystems. In: Han Y., Okamoto T., Qing S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028486Google ScholarGoogle ScholarCross RefCross Ref
  7. What is the eIDAS Regulation? Article by UK information commissioner office https://ico.org.uk/for-organisations/guide-to-eidas/what-is-the-eidas-regulation/Google ScholarGoogle Scholar
  8. Axel Eggert (2006) Intangibility and Perceived Risk in Online Environments, Journal of Marketing Management, 22:5-6, 553-572, DOI: 10.1362/026725706777978668Google ScholarGoogle ScholarCross RefCross Ref
  9. Cisbani, Emanuele, Chaining up Time: Bitcoin and Long-Term Validity of PKI Timestamp Tokens (August 25, 2020). Available at SSRN: https://ssrn.com/abstract=3743330 or http://dx.doi.org/10.2139/ssrn.3743330Google ScholarGoogle ScholarCross RefCross Ref
  10. Egyptian Ministry of Communication and Information Technology Resolution No. 236 of 2020 amending the executive regulations of Law No. 15 of 2004 regulating electronic signature and establishing the Information Technology Industry Development Agency https://itida.gov.eg/English/Documents/3.pdfGoogle ScholarGoogle Scholar
  11. Ross, J. "Network Working Group D. Pinkas Request for Comments: 5126 Bull SAS Obsoletes: 3126 N. Pope Category: Informational Thales eSecurity." (2008). https://datatracker.ietf.org/doc/html/rfc5126Google ScholarGoogle Scholar
  12. Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N. & Schwenk, J., (2019). Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In: Roßnagel, H., Wagner, S. & Hühnlein, D. (Hrsg.), Open Identity Summit 2019. Gesellschaft für Informatik, Bonn. (S. 95-106). https://dl.gi.de/bitstream/handle/20.500.12116/20997/proceedings-08.pdfGoogle ScholarGoogle Scholar

Index Terms

  1. Offline Digital Signature Validation Model with Enhanced Time-Stamping

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICSIE '23: Proceedings of the 2023 12th International Conference on Software and Information Engineering
      November 2023
      110 pages
      ISBN:9798400708107
      DOI:10.1145/3634848

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 January 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format