Skip to main content

Efficient Authentication of Electronic Document Workflow

  • Conference paper
Information Security and Cryptology (CISC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3822))

Included in the following conference series:

Abstract

In the history of document circulation, many participants may annotate and sign on the document so as to produce a final authentic document. This circulation process requires that a later participant can know the document circulation history, verify all the previous annotations, but can not modify them. To be applicable to devices of limited resources, the document processing approach should be efficient in terms of computational cost and network overhead. This paper extends an aggregate signature scheme so as to combine many signatures into one no matter which kind of circulating route (sequential, parallel, or hybrid) is. Since the proposal enables to manage the documents easily, it is useful and practical in office automation applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atluri, V., Bertino, E., Ferrari, E., Mazzoleni, P.: Supporting Delegation in Secure Workflow Management Systems. In: IFIP WG 11.3 Conference on Data and Application Security, pp. 199–212 (2003)

    Google Scholar 

  2. Atluri, V., Chun, S., Mazzoleni, P.: A Chinese Wall Security Model for Decentralized Workflow Systems. In: 8th ACM Conference on Computer and Communication Security, pp. 48–57 (2001)

    Google Scholar 

  3. Atluri, V., Huang, W.-K.: Enforcing Mandatory and Discretionary Security in Workflow Management Systems. J. of Computer Security 5(4), 303–339 (1997)

    Google Scholar 

  4. Yuichi, M., Kazuhiro, S.: Digitised document circulating system with circulation history. US patent No. 5,767,847 (1998)

    Google Scholar 

  5. Prinz, W.: Two Complementary Tools for the Co-operation in a Ministerial Environment. Journal of Universal Computing Science, 843–864 (1997)

    Google Scholar 

  6. Kenjiro, M., Toshiro, N.: Method of editing and circulating an electronic draft document amongst reviewing persons at remote terminals attached to a local area network. US patent No. 5,040,142 (1991)

    Google Scholar 

  7. Hiroshi, M., Kazuo, T.: Electronic document processing system and method of forming digital signature. US patent No. 5,465,299 (1995)

    Google Scholar 

  8. Shieh, S.-P., Lin, C.-T., Yang, W.-B., Sun, H.-M.: Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems. IEEE Trans. on Vehicular Technology 49(4), 1464–1473 (2000)

    Article  Google Scholar 

  9. Yi, X., Siew, C.K.: Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Trans. on Vehicular Technology 51(6), 1313–1315 (2002)

    Article  Google Scholar 

  10. Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Zhu, H., Bao, F., Li, T., Wu, Y.: Constructing Sequential Aggregate Signatures for Secure Wireless Routing Protocols. In: IEEE WCNC (2005)

    Google Scholar 

  12. National Institure of Standards and Technology, “Secure Hash Standard (SHS)”, FIPS Publication 180-1 (1995)

    Google Scholar 

  13. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Comm. of the ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  14. National Institure of Standards and Technology. Proposed Federal Information Processing Standard for Digital Signature Standard (DSS), Federal Register, 56(169), 42980-42982 (1991)

    Google Scholar 

  15. Shparlinski, I.E.: Finite Fields: Theory and Computation, pp. 215–239. Kluwer Academic Publishers, Dordrecht (1999) (ISBN 0-7923-5662-4)

    MATH  Google Scholar 

  16. Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: NDSS (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, Y. (2005). Efficient Authentication of Electronic Document Workflow. In: Feng, D., Lin, D., Yung, M. (eds) Information Security and Cryptology. CISC 2005. Lecture Notes in Computer Science, vol 3822. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599548_9

Download citation

  • DOI: https://doi.org/10.1007/11599548_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30855-3

  • Online ISBN: 978-3-540-32424-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics