24.11.2014 Views

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[8] Gonzalez O., Leon C., Miranda G. et al.: A Parallel Skeleton for<br />

the Strength Pareto Multiobjective Evolutionary Algorithm 2. Proceedings<br />

of 15th EUROMICRO International Conference on Parallel,<br />

Distributed and Network-Based Processing (PDP’07), pp.<br />

434-441. IEEE Computer Society, 2007.<br />

[9] Mariano C. E., Morales E.: MOAQ anAnt-QAlgorithm for Multiple Objective<br />

Optimization Problems. Genetic and Evolutionary Computing<br />

Conference (GECCO 99), vol. 1, pp. 894-901, San Francisco, 1999.<br />

[10] Guntsch M., Middendorf M.: Solving Multi-criteria Optimization<br />

Problems with Population-Based ACO. Lecture Notes in Computer<br />

Science, vol. 2632, pp. 464-478, Springer, 2003.<br />

[11] Hansen M. P.: Use of Substitute Scalarizing Functions to Guide a<br />

Local Search Based Heuristic: The Case of moTSP. Journal of<br />

Heuristics, vol. 6, pp. 419-431, Kluwer Academic Publishers, 2000.<br />

[12] Armentano V. A., Arroyo J. E. C.: An Application of a Multi-Objective<br />

Tabu Search Algorithm to a Bicriteria Flowshop Problem.<br />

Journal of Heuristics, vol. 10, pp. 463-481, Kluwer Academic<br />

Publishers, 2004.<br />

[13] Suppapitnarm A., Seffen K. A., Parks, G. T. et al.: Simulated annealing:<br />

An alternative approach to true multiobjective optimization.<br />

Engineering Optimization, vol. 33, no 59, 2000.<br />

[14] Czyżak P., Jaszkiewicz, A.: Pareto simulated annealing - A metaheuristic<br />

technique for multiple-objective combinatorial optimization.<br />

Journal of Multicriteria Decision Analysis, vol. 7, no 34, 1998.<br />

[15] Suman, B.: Multiobjective simulated annealing - A metaheuristic<br />

technique for multiobjective optimization of a constrained problem.<br />

Foundations of Computing and Decision Sciences, vol. 27,<br />

no 171, 2002.<br />

Signed electronic document and its probative value<br />

in certificate and certificateless public key<br />

cryptosystem infrastructures<br />

(Podpisany dokument elektroniczny i jego wartość dowodowa<br />

w certyfikatowej i bezcertyfikatowej infrastrukturze kryptosystemu<br />

klucza publicznego)<br />

dr inż. JERZY PEJAŚ<br />

Zachodniopomorski Uniwersytet Technologiczny, Wydział Informatyki, Szczecin<br />

1. Introduction<br />

The Art. 5, paragraph 1 of the Act on Electronic Signature from<br />

September 18 th , 2001 (see [1]) states that the secure electronic<br />

signature based on a qualified certificate (shortly, the<br />

qualified electronic signature) evokes legal effects defined by<br />

Act if it was created in the validity period of this certificate. This<br />

regulation doesn’t apply to the certificate after period of its validity<br />

or from the day of its revocation and in the period of its<br />

suspension unless there is possible to prove that the signature<br />

was created before end of the validity period of the certificate<br />

or its revocation or suspension (i.e. to avoid a signature to become<br />

unduly questionable or even rejected in the future, the<br />

point in time when it was issued may require to be provable).<br />

The requirement for proving a time of an electronic signature<br />

generation becomes a crucial element for signature validity<br />

and for a probative value of an electronic document related<br />

to this signature (1) . This is crucial also for the sake of decreasing<br />

evidence value of an electronic document that with the time<br />

elapsed does not have the same longevity properties as physical<br />

documents. Particularly, it results from two reasons at least:<br />

• cryptographic algorithms and keys used for an electronic<br />

signature creation can become weak and not sufficiently<br />

resistant against different attacks,<br />

• information necessary for an electronic signature verification<br />

and validation is not accessible (e.g. due to the lack of access<br />

to CA certificates, CRLs, electronic documents, etc.).<br />

After many years facts stated above could make impossible<br />

to verify formerly created electronic signatures, what could<br />

result in the lack of total probative value of an electronic document<br />

(of course, if such a value was possessed by the document<br />

at storage time).<br />

Further, we assume that the probative value of a signed<br />

electronic document consists of document content, additional<br />

security elements and a context (particularly a legal context).<br />

The probative value of an electronic document has to be preserved.<br />

It means using organizational and technical measures<br />

guaranteeing the keeping an electronic signature verifiable<br />

over long period or the retrieving a reliable information on its<br />

status, and enabling the verification of the electronic document<br />

authenticity related to this signature.<br />

The rest of the paper is organized as follow. In Section 2, we<br />

formulate the model of a certified electronic signature scheme<br />

(CESS) describing a signature creation and verification process<br />

in the traditional Public Key Cryptosystem (PKC) and in Certificateless<br />

Public Key Cryptography (CL-PKC). Section 3 shows<br />

that usage of technical measures for the keeping the probative<br />

value of an electronic document needs some extension of CESS<br />

model to the form LT-CESS as well as including a Virtual Signed<br />

Electronic Document (V-SED), providing a provable authenticity<br />

of an electronic document over long period. Then two practical<br />

examples of V-SED development based on time stamp chains<br />

and a sequence of archive time stamps are presented (see Section<br />

4 and 5). Finally, we conclude the paper in Section 6.<br />

2. Electronic signature schemes<br />

The first thing to notice is that any electronic signature scheme<br />

will never be able to exist without a Trusted Authority (TA). This<br />

is because the TA is required to guarantee the authenticity of<br />

users’ public keys.<br />

In the traditional Public Key Cryptosystem (PKC), a Certificate<br />

Authority (CA) issuing a digitally signed explicit certificate<br />

binding an identity and a public key of a user achieves<br />

30 ELEKTRONIKA 11/<strong>2009</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!