Abstract
Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In particular, digital signatures of originals break depriving documents of probative force. This report elucidates legal problems, and introduces fundamental concepts of legally secure document transformations in a deliberately generic, application-independent way. A process analysis of transformations of signed documents is carried out to elicit common security requirements. This leads to the solution approach transformation seal, a cryptographically secured container used to ensure legal security for transformed documents by securing the content’s integrity, attesting a transformation’s correctnes, and attributing it to a responsible party.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
The UNCITRAL Model Law on Electronic Commerce, www.uncitral.org/english/texts/electcom/ml-ecomm.html
Guide to Enactment of the UNCITRAL Model Law on Electronic Commerce, www.uncitral.org/english/texts/electcom/ml-elecsig-e.pdf
Website of the TransiDoc project, www.transidoc.de
Long-Term Archiving and Notary Services Working Group of the IETF, ietf.org/html.charters/ltans-charter
Wallace, C., Chokhani, S.: Trusted archive protocol (TAP) IETF Internet draft (2003), www.ietf.org/internet-drafts/draft-ietf-pkix-tap-00.txt
Landrock, P., Pedersen, T.: WYSIWYS? What you see is what you sign? Information Security Technical Report 3, 55–61 (1998)
Schmidt, A.U.: Signiertes XML und das Präsentationsproblem. Datenschutz und Datensicherheit 24, 153–158 (2000)
Website of the European Bridge CA project, http://www.bridge-ca.de
Ansper, A., Buldas, A., Roos, M., Willemson, J.: Efficient long-term validation of digital signatures. In: Proceedings of 4th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2001), Korea, pp. 402–415 (2001)
Dumortier, J., van den Eynde, S.: Electronic signatures and trusted archival services. In: Proceedings of the DLMForum 2002, Barcelona, Luxembourg, Office for Official Publications of the European Communities, May 6–8, pp. 520–524 (2002)
Lekkas, D., Gritzalis, D.: Cumulative notarization for long-term preservation of digital signatures. Computers & Security 23, 413–424 (2004)
Website of the ArchiSig project, www.archisig.de
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schmidt, A.U., Loebl, Z. (2005). Legal Security for Transformations of Signed Documents: Fundamental Concepts. In: Chadwick, D., Zhao, G. (eds) Public Key Infrastructure. EuroPKI 2005. Lecture Notes in Computer Science, vol 3545. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11533733_18
Download citation
DOI: https://doi.org/10.1007/11533733_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28062-0
Online ISBN: 978-3-540-31585-8
eBook Packages: Computer ScienceComputer Science (R0)