Skip to main content

An X.509 Based Licensed Digital Signature Framework for Hierarchical Organizations

  • Conference paper
Recent Trends in Wireless and Mobile Networks (WiMo 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 84))

Included in the following conference series:

  • 622 Accesses

Abstract

Digital signatures are used for integrity of the signed media and authentication of the signers in digital environment. Beyond these the signature might provide an authorization service for a verifier to check whether the signer has license to sign the document in workflow. This verification is important in case of exchanging valuable documents between different organizational levels and also crucial in digital document archive. In this work, the necessity of signature authorization was described and also implementation of the authorization with X.509 based templates in hierarchical organizations was expressed. Also, a license structure for digital signature and a framework where signatures realize authorization of the signers on a document in hierarchical organization structure were proposed.

Supported by The Scientific and Technological Research Council of Turkey (TÃœBÄ°TAK), The Support Program for Scientific and Technological Research Projects (No. 108E132).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundamentals E79-A(9) (1996)

    Google Scholar 

  2. Wang, G., Bao, F., Zhou, J., Deng, R.H.: Security Analysis of Some Proxy Signatures. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 305–319. Springer, Heidelberg (2004)

    Google Scholar 

  3. Wang, G.: Designated-Verifier Proxy Signature Schemes. In: IFIP/ SEC 2005, pp. 409–423. Springer, Heidelberg (2005)

    Google Scholar 

  4. Chaum, D., Antwerpen, H.V.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–217. Springer, Heidelberg (1990)

    Google Scholar 

  5. Pedersen, T.P.: Distributed provers with applications to undeniable signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 221–242. Springer, Heidelberg (1991)

    Google Scholar 

  6. Saednia, S., Kremer, S., Markowitch, O.: An efficient strong designated verifier signature scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004)

    Google Scholar 

  7. Steinfeld, R., Bull, L., Wang, H., Piperzyk, J.: Universal Designated-Verifier Signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 523–542. Springer, Heidelberg (2003)

    Google Scholar 

  8. Ogata, W., Kurosawa, K., Heng, S.-H.: The Security of the FDH Variant of Chaum’s Undeniable Signature Scheme. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 328–345. Springer, Heidelberg (2005)

    Google Scholar 

  9. Ugur, A., Sogukpinar, I.: A Framework for Licensed Digital Signatures. In: The First International Workshop on Network & Communications Security Co-l.w Netcom 2009, Chennai, India, December 27-29 (2009)

    Google Scholar 

  10. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  11. Boneh, D., Franklin, M.K.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Paterson, K.G.: ID-based signatures from pairings on elliptic curves. IEEE Communications Letters 38(18), 1025–1026 (2002)

    Google Scholar 

  13. Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)

    Google Scholar 

  14. Lin, C.-Y., Wu, T.-C., Zhang, F., Hwang, J.-J.: New identity-based society oriented signature schemes from pairings on elliptic curves. Applied Mathematics and Computing 160 (2005)

    Google Scholar 

  15. Jin, W., Li, D., Li, Q., Xi, B.: Constructing Role-Based Access Control and Delegation Based on Hierarchical IBS. In: IFIP NPC Workshop (2007)

    Google Scholar 

  16. Lui Richard, W.C., Hui Lucas, C.K., Yiu, S.M.: Delegation with supervision. Information Sciences 177(19), 4014–4030 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  17. Ugur, A., Sogukpinar, I.: A New Hierarchical Signature Scheme with Authorization, ISCTurkey (2007)

    Google Scholar 

  18. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC 5280. IETF (May 2008)

    Google Scholar 

  19. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Pearson Ed., London (2006)

    Google Scholar 

  20. Adams, C., Lloyd, S.: Understanding PKI Concepts, Standards, and Deployment Considerations, 2nd edn. Addison Wesley, Reading (2003)

    Google Scholar 

  21. Li, C., Yang, C., Cheung, R.: Key Management for Role Hierarchy in Distributed Systems. Journal of Network and Comp. Applications 30, 920–936 (2007)

    Article  Google Scholar 

  22. An Internet Attribute Certificate Profile for Authorization, RFC 3281, IETF (2002)

    Google Scholar 

  23. Internet X.509 Public Key Infrastructure Subject Identification Method (SIM) (October 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ugur, A., Sogukpinar, I. (2010). An X.509 Based Licensed Digital Signature Framework for Hierarchical Organizations. In: Özcan, A., Chaki, N., Nagamalai, D. (eds) Recent Trends in Wireless and Mobile Networks. WiMo 2010. Communications in Computer and Information Science, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14171-3_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14171-3_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14170-6

  • Online ISBN: 978-3-642-14171-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics