Skip to main content

“eCert” Improving the Security and Controllability of Digitally Signed Documents

  • Chapter
  • First Online:
Electronic Identity

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

  • 985 Accesses

Abstract

Issues and technology gaps exist in the realm of secure transmission of electronic documents. In this chapter, we propose a working solution (“eCert”) to the problems identified. This has been developed by exploring a case study of an electronic qualification (eCertificate) system, by developing a prototype system, and by testing it within several popular ePortfolio systems. From this work, the underlying protocol (the “eCert protocol”) has been abstracted and applied to a different domain, that of electronic identity documents. The resulting “Mobile eID” application has also been produced and tested, potentially enabling a person to carry their identity documents on a mobile phone, while ensuring that such documents can be verified as correct and tamper-free. A significant issue in this work is that the protocol developed is user-centric. Thus, the user retains ownership and control of their documents, yet is unable to tamper with the document contents, mirroring the current situation with corresponding paper equivalents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    European Union. Opening doors to learning and working in Europe: Information On Europass Certificate Supplement. 2004; accessed on 28 January 2010; Available from: http://europass.cedefop.europa.eu/europass/home/hornav/Introduction.csp. All information about Europass was sourced from this website.

  2. 2.

    CHESICC. The Certificate Information Verification services in China. 2005; accessed on 02 September 2008; Available from: http://www.chsi.com.cn/about_en/. All information about CHESICC was sourced from this website.

  3. 3.

    Digitary. Secure Electronic Documents. 2008; accessed on 16 August 2008; Available from: http://www.digitary.net/aboutus.htm. All information about Digitary was sourced from this website.

  4. 4.

    In 2009, the Department of Education, Employment and Workplace Relations of the Australian government established the Australian Flexible Learning Framework, and set up the eWork project to investigate existing learner information verification services and systems to identify the verification needs of third parties (Macnamara et al. 2010, 2011).

  5. 5.

    Locked PDF and water marking are commonly used in protecting digital data from unauthorized access and copying. By embedding a cryptographic string, or water mark, a legitimate author can demonstrate the origin of the file (Pfleeger and Pfleeger 2007); However, simple locked PDF can be easily unlocked through password recovery software; and although these techniques could be used to protect unauthorized copying, accessing, and to indicate who the issuer is, for use in eCertificate case, it could not prove that the issuer was an authorized educational body and they don’t handle the withdraw process.

  6. 6.

    eFolio: University of Southampton ePortfolio system. accessed on 2 March 2010; Available from: http://www.efolio.soton.ac.uk/

  7. 7.

    Mahara: an open source ePortfolio system. accessed on 2 March 2010; Available from: http://mahara.org/

  8. 8.

    The eCert project (http://ecert.ecs.soton.ac.uk/): A JISC funded research project, aim to address the issues of design for a suitable user-centric “eCertificate” system.

  9. 9.

    http://www.denso-wave.com/qrcode/index-e.html, accessed 22 Mar 2011.

References

  • Abrami PC, Barrett H (2005) Directions for research and development on electronic portfolios. Can J Learn Technol 31(3):1–15

    Google Scholar 

  • Chen-Wilson L (2010) The eCert project. 2010 [cited 2010; http://ecert.ecs.soton.ac.uk/]

  • CHESICC (2005) The certificate information verification services in China. http://www.chsi.com.cn/about_en/ Accessed 02 Sept 2008

  • Davis J (2009) Digital signatures application guidelines on digital signature practices for common criteria security, in MSDN Magazine

    Google Scholar 

  • Digitary (2008) Secure electronic documents. http://www.digitary.net/aboutus.htm Accessed 12 Aug 2008

  • European Communities (2007) CERTIFICATE SUPPLEMENT: advanced certificate craft—electrical

    Google Scholar 

  • European Communities (2008) InformationOn/EuropassCertificateSupplement/navigate.action. http://europass.cedefop.europa.eu/europass/home/vernav/Accessed 28 Jan 2008

  • Goldwasser S, Micali S, Rivest R (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2):281–308

    Article  MATH  MathSciNet  Google Scholar 

  • Hartnell-Young E et al (2006) Joining up the episodes of lifelong learning: a regional transition project. British J Educ Technol 37(6):853–866

    Article  Google Scholar 

  • Higgs P et al (2010) Trust federation user consultation and use-case collation, University of Southern Queensland’s Link Affiliates

    Google Scholar 

  • Kaliski B (2003) Raising the Standard for RSA Signatures: RSA-PSS (RSA Laboratories). http://www.rsa.com/rsalabs/node.asp?id=2005

  • Linstone HA, Turoff M (2002) The Delphi method: techniques and applications. Addison—Wesley, Reading, pp 618

    Google Scholar 

  • Lysyanskaya A (2002) Signature schemes and applications to cryptographic protocol design, in electrical engineering and computer science. Massachusetts Institute of Technology (MIT), United States

    Google Scholar 

  • Macnamara D, Drury C, Ward N (2010) Verifying VET learner attainment data—an investigation of learner verification services and third party verification needs, 2010, University of South Queensland Link Affiliates (Where is Report No or Journal or URL)

    Google Scholar 

  • Macnamara D, Nicholas N, Miller A (2011) Accessing VET learner attainment data: an investigation to enable learner-facilitated electronic access to their VET learner attainment data. The Tertiary Education Research Database—education for work and beyond, 68

    Google Scholar 

  • Mao W (2004) Modern cryptography: theory & practice. Prentice Hall, New Jersey, p. 308 (Professional Technical Reference)

    Google Scholar 

  • Naedele M (2003) Standards for XML and Web services security. Computer 36(4):96–98

    Article  Google Scholar 

  • Network Working Group (2008) Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC5280

    Google Scholar 

  • Papazoglou M (2003) Service-orientated computing: concepts, characteristics and directions. In: IEEE International Conference on web information systems engineering, Rome

    Google Scholar 

  • Pfleeger CP, Pfleeger SL (2007) Security in computing, 4th edn. Prentice Hall, Englewood Cliffs

    Google Scholar 

  • Pronichkin ARTEM OR DIMITRY? (2012) Certificate revocation list (CRL) verification—an application choice. 2012 12; Jan 2013; 29 Jul 2012: Available from: http://social.technet.microsoft.com/wiki/contents/articles/964.certificate-revocation-list-crl-verification-an-application-choice.aspx

  • Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):12–126

    MathSciNet  Google Scholar 

  • Rowe G, Wright G (2001) Expert opinions in forecasting: the Role of the Delphi technique. In: Armstrong J (ed) Principles of forecasting. Kluwer Academy Publishers, Norwellpp, pp 125–144

    Google Scholar 

  • Royce P et al (2008) Report on on-line authentication of qualification records, 2008, MSc Computer Science Group Development Project, University of Southampton

    Google Scholar 

  • Sadd G (2010) What do you think I am: trusted relationship management. In: London learning forum. London, UK

    Google Scholar 

  • Saunders M, Lewis P, Thornhill A (2009) Research methods for business students, 5th edn. Pearson Education, Trans-Atlantic Publications Inc, UK

    Google Scholar 

  • Selkirk A (2001) Using XML security mechanisms. BT Technol Jurnal 19(3):35–43

    Article  Google Scholar 

  • Sturcke J (2007) Government offers reward in hunt for lost data, in Guardian

    Google Scholar 

  • W3C recommendation (2002) XML signature syntax and processing

    Google Scholar 

  • Wills G et al (2006) FREMA: e-learning framework reference model for assessment. FREMA Project J. Available from http://www.frema.ecs.soton.ac.uk/projectJournal/

  • Zenise M, Vitaletti A, Argles D (2011a) A user-centric approach to eCertificate for electronic identities (eIDs) management in mobile environment. In: IEEE world congress on internet security (WorldCIS), 2011, London, UK

    Google Scholar 

  • Zenise M et al (2011b) eIDeCert: a user-centric solution for mobile identification. Int J Infon 4(3/4):527–536

    Google Scholar 

  • Zimmermann PR (1995) The official PGP user’s guide. MIT Press, Cambridge

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lisha Chen-Wilson .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Chen-Wilson, L., Argles, D., di Zenise, M.S., Wills, G. (2014). “eCert” Improving the Security and Controllability of Digitally Signed Documents. In: Electronic Identity. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-6449-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6449-4_2

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6448-7

  • Online ISBN: 978-1-4471-6449-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics