Pervasive digital signatures : Syntactic robustness and simplicity of signed documents

The action of digitally signing has several intrinsic weaknesses that introduce syntactic and semantic distance between a signer and a relying party. As a result, digitally signed documents cannot be trusted and thus be widely deployed in pervasive environments. We evaluate the syntactic robustness of digitally signed documents by exploiting one key quantitative measure (the structural informativeness) and by comparing several qualitative characteristics of various alternative syntaxes. We are then able to identify which is the more reliable and simpler to transform syntax that will enhance the pervasiveness of signed documents, while it can be used in resource-constraint mobile devices. At the same time, digitally signed documents must preserve their security characteristics and their formatting and layout capabilities in order to achieve an enhanced level of trust on the semantic part of communication and thus be ubiquitously integrated with human users.

[1]  Trustworthiness of signed data , 2002 .

[2]  V. Akila,et al.  Information , 2001, The Lancet.

[3]  Dimitris Gritzalis,et al.  Cumulative notarization for long-term preservation of digital signatures , 2004, Comput. Secur..

[4]  C. Mitchell,et al.  Digitally Signed Documents – Ambiguities and Solutions , 2004 .

[5]  Karl Scheibelhofer What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification , 2001, Communications and Multimedia Security.

[6]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[7]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[8]  Loren M. Kohnfelder,et al.  Towards a practical public-key cryptosystem. , 1978 .

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  B. Küppers Information and the origin of life , 1990 .

[11]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.

[12]  Ueli Maurer Intrinsic Limitations of Digital Signatures and How to Cope with Them , 2003, ISC.

[13]  Carlisle M. Adams,et al.  Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) , 2001, RFC.

[14]  Jean Scholtz,et al.  Toward a Framework for Evaluating Ubiquitous Computing Applications , 2004, IEEE Pervasive Comput..

[15]  Audun Jøsang,et al.  What You See is Not Always What You Sign , 2002 .

[16]  Ravi S. Sandhu,et al.  Models, protocols, and architectures for secure pervasive computing: challenges and research directions , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.