Skip to main content

Legal Security for Transformations of Signed Documents: Fundamental Concepts

  • Conference paper
Public Key Infrastructure (EuroPKI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3545))

Included in the following conference series:

Abstract

Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In particular, digital signatures of originals break depriving documents of probative force. This report elucidates legal problems, and introduces fundamental concepts of legally secure document transformations in a deliberately generic, application-independent way. A process analysis of transformations of signed documents is carried out to elicit common security requirements. This leads to the solution approach transformation seal, a cryptographically secured container used to ensure legal security for transformed documents by securing the content’s integrity, attesting a transformation’s correctnes, and attributing it to a responsible party.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The UNCITRAL Model Law on Electronic Commerce, www.uncitral.org/english/texts/electcom/ml-ecomm.html

  2. Guide to Enactment of the UNCITRAL Model Law on Electronic Commerce, www.uncitral.org/english/texts/electcom/ml-elecsig-e.pdf

  3. Website of the TransiDoc project, www.transidoc.de

  4. Long-Term Archiving and Notary Services Working Group of the IETF, ietf.org/html.charters/ltans-charter

  5. Wallace, C., Chokhani, S.: Trusted archive protocol (TAP) IETF Internet draft (2003), www.ietf.org/internet-drafts/draft-ietf-pkix-tap-00.txt

  6. Landrock, P., Pedersen, T.: WYSIWYS? What you see is what you sign? Information Security Technical Report 3, 55–61 (1998)

    Article  Google Scholar 

  7. Schmidt, A.U.: Signiertes XML und das Präsentationsproblem. Datenschutz und Datensicherheit 24, 153–158 (2000)

    Google Scholar 

  8. Website of the European Bridge CA project, http://www.bridge-ca.de

  9. Ansper, A., Buldas, A., Roos, M., Willemson, J.: Efficient long-term validation of digital signatures. In: Proceedings of 4th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2001), Korea, pp. 402–415 (2001)

    Google Scholar 

  10. Dumortier, J., van den Eynde, S.: Electronic signatures and trusted archival services. In: Proceedings of the DLMForum 2002, Barcelona, Luxembourg, Office for Official Publications of the European Communities, May 6–8, pp. 520–524 (2002)

    Google Scholar 

  11. Lekkas, D., Gritzalis, D.: Cumulative notarization for long-term preservation of digital signatures. Computers & Security 23, 413–424 (2004)

    Article  Google Scholar 

  12. Website of the ArchiSig project, www.archisig.de

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schmidt, A.U., Loebl, Z. (2005). Legal Security for Transformations of Signed Documents: Fundamental Concepts. In: Chadwick, D., Zhao, G. (eds) Public Key Infrastructure. EuroPKI 2005. Lecture Notes in Computer Science, vol 3545. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11533733_18

Download citation

  • DOI: https://doi.org/10.1007/11533733_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28062-0

  • Online ISBN: 978-3-540-31585-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics