Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function

In a collaborative workflow platform, when a group leader receives a document which requires cooperators’ support, she/he assigns the task to the cooperators. Each cooperator can modify the document in real-time and view the other cooperators’ modifications simultaneously. A worth-discussing problem in such environment is how to find the specific cooperator efficiently when some errors happen. Another problem is how to efficiently verify all the revisions stored on the platform. To deal with the problems, we first propose a novel bi-trapdoor hash function, and use it to construct a collaborative workflow platform. The proposed platform has three advantages: low computation cost in the online phase, rapid approach to finding the editor of a revision in a collaborative platform, and batch verification support for all revisions.

[1]  Mark J. Clement,et al.  Performance of finite field arithmetic in an elliptic curve cryptosystem , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[2]  Mihir Bellare,et al.  The Security of Practical Two-Party RSA Signature Schemes , 2001, IACR Cryptol. ePrint Arch..

[3]  Haibin Zhu,et al.  Some issues of role-based collaboration , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[4]  Claus-Peter Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.

[5]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[6]  Seng-Phil Hong,et al.  Access control in collaborative systems , 2005, CSUR.

[7]  Kwangjo Kim,et al.  Discrete logarithm based chameleon hashing and signatures without key exposure , 2011, Comput. Electr. Eng..

[8]  Kaisa Nyberg,et al.  Fast Accumulated Hashing , 1996, FSE.

[9]  K. Lauter,et al.  The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.

[10]  Marc Joye,et al.  An Efficient On-Line/Off-Line Signature Scheme without Random Oracles , 2008, CANS.

[11]  Anas Abou El Kalam,et al.  Access Control for Collaborative Systems: A Web Services Based Approach , 2007, IEEE International Conference on Web Services (ICWS 2007).

[12]  Aniket Kittur,et al.  He says, she says: conflict and coordination in Wikipedia , 2007, CHI.

[13]  Mukesh Singhal,et al.  Efficient proxy signatures based on trapdoor hash functions , 2010, IET Inf. Secur..

[14]  Yael Tauman Kalai,et al.  Improved Online/Offline Signature Schemes , 2001, CRYPTO.

[15]  Giuseppe Ateniese,et al.  On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.