A PKI based timestamped secure signing tool for e-documents

S. Goswami, S. Misra, M. Mukesh
{"title":"A PKI based timestamped secure signing tool for e-documents","authors":"S. Goswami, S. Misra, M. Mukesh","doi":"10.1109/ICHPCA.2014.7045360","DOIUrl":null,"url":null,"abstract":"With digitization of documents becoming a buzz word, several research initiatives have been taken in the field. However, an associated challenge that arises is the process of certifying and validating document integrity and ensuring non-repudiation. E-signatures gave a solution but could not prove the signer's identity. Digital certificates were thereafter used along with signatures to prove the identity of the signer. In this paper we present a schema for embedding digital signature as well as certifying and verifying the content of electronic document in a secured and tamperproof manner. Digital signature is created with hash value of the document generated by a hashing algorithm and encrypting the hash value by private key of the signer. Finally, the document is time stamped by an authorized time stamping server. The paper incorporates a novel online validation mechanism for ensuring the usage of live certificate in signing the document and also checks the integrity of the document. It also suppresses the replay attack by encrypting user credential at one end and decrypting and verifying it at the other end with asymmetric key cryptography. Another unique mechanism incorporated to redundantly suppress replay attach is to embed a timestamp, generated by authorized third party time-stamping authority, which registers and verifies user identity. The system was exposed to security vulnerability assessment using a suite of tools as well as other mechanisms reported in literature. Results of attack assessment indicated that the system is capable of handling most of the dangerous threats and vulnerabilities.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICHPCA.2014.7045360","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

With digitization of documents becoming a buzz word, several research initiatives have been taken in the field. However, an associated challenge that arises is the process of certifying and validating document integrity and ensuring non-repudiation. E-signatures gave a solution but could not prove the signer's identity. Digital certificates were thereafter used along with signatures to prove the identity of the signer. In this paper we present a schema for embedding digital signature as well as certifying and verifying the content of electronic document in a secured and tamperproof manner. Digital signature is created with hash value of the document generated by a hashing algorithm and encrypting the hash value by private key of the signer. Finally, the document is time stamped by an authorized time stamping server. The paper incorporates a novel online validation mechanism for ensuring the usage of live certificate in signing the document and also checks the integrity of the document. It also suppresses the replay attack by encrypting user credential at one end and decrypting and verifying it at the other end with asymmetric key cryptography. Another unique mechanism incorporated to redundantly suppress replay attach is to embed a timestamp, generated by authorized third party time-stamping authority, which registers and verifies user identity. The system was exposed to security vulnerability assessment using a suite of tools as well as other mechanisms reported in literature. Results of attack assessment indicated that the system is capable of handling most of the dangerous threats and vulnerabilities.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于PKI的电子文档时间戳安全签名工具
随着文献数字化成为一个热门词汇,该领域已经采取了一些研究举措。然而,出现的一个相关挑战是认证和验证文档完整性并确保不可否认性的过程。电子签名给出了一个解决方案,但不能证明签名者的身份。此后,数字证书与签名一起用于证明签名者的身份。本文提出了一种嵌入数字签名的方案,并以安全、防篡改的方式对电子文档的内容进行认证和验证。使用哈希算法生成的文档的哈希值创建数字签名,并使用签名者的私钥对哈希值进行加密。最后,由授权的时间戳服务器对文档进行时间戳。本文引入了一种新的在线验证机制,以确保在签名文件时使用实时证书,并检查文件的完整性。它还通过在一端对用户凭证进行加密,在另一端使用非对称密钥加密对其进行解密和验证来抑制重放攻击。另一种用于冗余抑制重放附加的独特机制是嵌入一个时间戳,该时间戳由授权的第三方时间戳机构生成,用于注册和验证用户身份。使用一套工具以及文献中报道的其他机制对系统进行安全漏洞评估。攻击评估结果表明,该系统能够处理大多数危险威胁和漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
DE-FPA: A hybrid differential evolution-flower pollination algorithm for function minimization Ultra-thin Si directly on insulator (SDOI) MOSFETs at 20 nm gate length Secured packet inspection with hierarchical pattern matching implemented using incremental clustering algorithm Lifting biorthogonal wavelet design for edge detection Test case prioritization techniques “an empirical study”
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1