Pervasive digital signatures: Syntactic robustness and simplicity of signed documents
نویسندگان
چکیده
The action of digitally signing has several intrinsic weaknesses that introduce syntactic and semantic distance between a signer and a relying party. As a result, digitally signed documents cannot be trusted and thus be widely deployed in pervasive environments. We evaluate the syntactic robustness of digitally signed documents by exploiting one key quantitative measure (the structural informativeness) and by comparing several qualitative characteristics of various alternative syntaxes. We are then able to identify which is the more reliable and simpler to transform syntax that will enhance the pervasiveness of signed documents, while it can be used in resource-constraint mobile devices. At the same time, digitally signed documents must preserve their security characteristics and their formatting and layout capabilities in order to achieve an enhanced level of trust on the semantic part of communication and thus be ubiquitously integrated with human users.
منابع مشابه
A framework for the analysis of the reliability of digital signatures for secure e-commerce
Digital signatures provide a valuable tool for secure internet trading by ensuring data authenticity and integrity and most importantly by enforcing commitment and non-repudiation for the transacting parties. The action of digitally signing has, however, several intrinsic weaknesses that introduce syntactic and semantic distance between a signer and a relying party. As a result, digitally signe...
متن کاملFair digital signing: The structural reliability of signed documents
The exchange of digitally signed data inherits all the problems related to the indeterminacy of human communication, which are further intensified by the legal implications of signing. One of the fundamental intrinsic weaknesses of digital signatures is that the signer creates a signature on a series of bits, which may be differently transformed and perceived by the verifier (or relying party),...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملSigntiming Scheme based on Aggregate Signatures
The aim of timestamping systems is to provide a proof-of-existence of a digital document at a given time. By timestamping a digital document after it has been signed by concerned parties, we know when the document was signed. Timestamping services also provide the non-repudiation and long term properties for digital signatures. Combining both digital signature and provable timestamping guarante...
متن کاملTowards concrete application of electronic signature
Even though the theory behind digital signatures is fully understood and the related cryptographic methods have proved the efficiency in deploying security services, concrete application of digital signature to real electronic documents is still hindered by the lack of standards. In particular, we lack standards for the format of the data to be signed, the format of the signature itself and the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005