Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems
The trusted presentation of the signed or being signed data is one of the key problem, which should be solved in so called secure signature creation and verification devices. Such presentation (in literature respectively known as a What You See Is What You Sign (WYSIWYS) and What You See Was Signed (WYSWS) problems) is the crucial issue especially in distributed environment. The trust assigned to various elements of such environment is limited so the participation of the commonly accepted Trusted Party (TP) operating on-line is the solution of that problem [1, 2]. The paper contains proposal of some modification of the secure signature creation and verification protocol, which was presented by W. Chocianowicz, et al. [1, 2]. The modification is made in the part related to the trusted presentation of the data, which should be signed by the signer or validated by the verifier. The modification is based on the visual cryptography methods allowing the human to verify the authenticity of the data being signed or signed, without any knowledge of cryptography, cryptographic computations, or computational devices.
KeywordsSmart Card Authentication Scheme Secret Message Authentication Protocol Electronic Signature
Unable to display preview. Download preview PDF.
- 1.W. Chocianowicz, J. Pejaś, A. Ruci≁ski The Proposal of Protocol for Electronic Signature Creation in Public Environment, in Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, Springer New York 2005Google Scholar
- 2.W. Chocianowicz, J. Pejaś, A. Ruci≁ski Problems of trusted presentation the data to be signed and verified (in polish), VII Krajowa Konferencja Zastosowa≁ Kryptografii ENIGMA’2004, Warszawa, May 2004Google Scholar
- 4.M. Naor, A. Shamir Visual Cryptography, in Advances in Cryptology - Eurocrypt ‘94, A. De Santis ed., Lecture Notes in Computer Science, Springer-Verlag Berlin, 1994, pp. 1-12Google Scholar
- 5.M. Krause, H. U. Simon Determining the Optimal Contrast for Secret Sharing Schemes in Visual Cryptography, Electronic Colloquium on Computational Complexity, ECCC Reports 2000, Report TR00-003, ISSN 1433-8092Google Scholar
- 6.G. Ateniese, C. Blundo, A. De Santis, D. R. Stinson Visual Cryptography for General Access Structures, Electronic Colloquium on Computational Complexity (ECCC), 1996Google Scholar
- 7.L. W. Hawkes, Alec Yasinsac, C. Cline An Application of Visual Cryptography To Financial Documents, The Florida State University, College of Arts and Sciences Department of Computer Science Research, TR-001001, 2000Google Scholar
- 8.P. A. Eisen, D. R. Stinson Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels, Designs, Codes and Cryptography, Springer Netherlands, vol. 25, No 1, January 2002Google Scholar
- 9.M. Naor, B. Pinkas Visual Authentication and Identification, in Advances in Cryptology - CRYPTO ‘97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 1997, Lecture Notes in Computer Science, Springer-Verlag Berlin, 1997Google Scholar
- 10.M. Nakajima, Y. Yamaguchi Extended Visual Cryptography for Natural Images, Journal of WSCG, Vol.10, No.2, 2002Google Scholar
- 11.ETSI TR 102 203 Mobile Commerce (M-COMM) - Mobile Signatures - Business and Functional Requirements, V1.1.1 (2003-05), Technical ReportGoogle Scholar
- 12.Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, Official Journal of the European Communities, 19.1.2000Google Scholar