24.11.2014 Views

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In the context of CL-PKC, the idea of appending validity<br />

periods (for example, year, date or time) to identifiers ID U can<br />

be used ensuring that any partial private key, and hence any<br />

private key, has a limited lifetime. Then the revocation in CL-<br />

PKC systems can be handled in the same way as in ID-PKC<br />

systems using standard certificate-based revocation techniques.<br />

For example, this can be done by deploying an analogue<br />

of an online certificate status protocol (e.g. OCSP) or<br />

variants of certificate revocation lists (CRLs).<br />

3. Keeping the probative value<br />

of electronic documents<br />

Ensuring a long-term validity of stored electronic documents<br />

depends on both organizational and technical measures (see<br />

e.g. CWA 15579 [14]). When technical measures are used to<br />

keep the probative value of electronic documents then first of<br />

all there is necessary to apply the strong cryptographic algorithms<br />

and to provide additional and sufficient information -<br />

a certificate set (all certificates needed to generate a path that<br />

leads to a point the verifier trusts) and the relevant revocation<br />

information (2) (e.g. CRLs) related to this certificate set and to<br />

all other involved certificates. Trusted third party (TTP) providing<br />

a service of keeping the probative value of an electronic<br />

document over long period has to issue the evidence records<br />

attached to the electronic attestations (Section 5) and associated<br />

with a given document or a group of documents. All these<br />

electronic attestations and time stamp tokens cyclically created<br />

for all stored evidences are needed later for making a<br />

long-term verification, i.e. verifications when the signing certificate<br />

has expired. In this case only the verifier can independently<br />

perform the complete verification of a given<br />

document authenticity and the validity of all signatures and<br />

other evidences (e.g. time stamp tokens) related to it.<br />

The storage mechanisms used by a trusted third party<br />

(TTP) should be based on a long-term electronic signature<br />

scheme (LT-CESS) like this:<br />

The LT-CESS scheme in comparison to the CESS (see Section<br />

2) contains two additional elements:<br />

• (IV,SV) - a pair of interactive deterministic algorithms forming<br />

the verification protocol (e.g. CWA 14171 [11]); IV - an<br />

initial (or a short term) verification algorithm performed by<br />

a verifier after an electronic signature is generated in order<br />

to consolidate the signature by capturing additional information<br />

that will support its subsequent verification; SV -<br />

a subsequent (or a long-term) verification algorithm performed<br />

by a verifier some time after the initial application of<br />

a signature, to assess a signature’s validity, based on the<br />

data collected at initial verification time;<br />

• Preserve (P): a deterministic algorithm for long-term preservation<br />

of the probative value of electronic signatures/documents;<br />

this algorithm is based on the initial or subsequent<br />

verification algorithm and makes the additional activities<br />

needed to protect electronic signatures/documents from effects<br />

of their deterioration, technology obsolescence, and<br />

fading human recall.<br />

Preserve and (IV,SV) algorithms generate the evidence<br />

records attached to the electronic attestations. These elements<br />

are subsequently linked to each preserved electronic document<br />

and jointly form Virtual Signed Electronic Document (V-SED).<br />

V-SED document should fulfil the following requirements:<br />

(4)<br />

• each electronic document D is stored where produced<br />

(local repository) or in a deposit (regional repository);<br />

• V-SED contains the references to the electronic documents,<br />

the signatures associated with this document, the<br />

time stamp tokens and other evidences references allowing<br />

the creation of a real (complete) SED on demand.<br />

Storing the references allows the values of V-SED elements<br />

to be kept elsewhere, reducing the entire size of V-SED<br />

document. A virtual document with above properties is a tuple:<br />

where: ID R - the V-SED identifier in a repository, D R - the references<br />

to the documents and their attachments, S R - the references<br />

to the electronic signatures, E R - the references to the<br />

evidences related to an electronic signature and a document<br />

(including the references to the electronic attestations and the<br />

evidence records linked to them). For V-SED the following definition<br />

can be formulated:<br />

Definition. The electronic document is a long-term provable<br />

authentic, if exist a polynomial time Verify(V) algorithm<br />

that takes as an input the certification scheme CS (i.e. PKC or<br />

CL-PKC), the services related to a electronic signature TSI<br />

(Trusted Services Infrastructure), V-SED, the verification policy<br />

VP (Verification Policy), and outputs a value of each electronic<br />

signature {valid, invalid}:<br />

where: V is one from two algorithms being a member of the pair<br />

(IV,SV), while the notation array[1…n] means the verification of<br />

each electronic signature referenced in V-SED structure.<br />

Note that CS parameter in Equation (6) includes the parameters<br />

params of an electronic signature scheme, while V-<br />

SED structure - (D, Σ, pk IDU ,cert) parameters; compare the<br />

Equation (3).<br />

4. Timestamp chain and sequence<br />

The basic elements of V-SED structure, i.e. the electronic attestations<br />

and the evidence records linked to them, can be<br />

built in different ways. The most often used approach is based<br />

on the appropriate mechanisms of the time stamp chains<br />

building. These mechanisms have to ensure the requirements<br />

counted in the definition of the provable authentic document<br />

(see Section 3).<br />

The starting point for the timestamp chains creation is an<br />

archival electronic signature form CAdES-A [7], XAdES-A [8]<br />

or other equivalent form (e.g. PAdES [9]). Each of these forms<br />

should contain a time stamp of a system for preserving electronic<br />

document for long periods of time (an archive mark for<br />

shortly). This mark has the same meaning as the archive timestamp<br />

that are included into the archival signature forms<br />

CAdES-A or XAdES-A.<br />

The archive timestamp is added to the CAdES or XadES<br />

form as an unsigned attribute. The hash value related to this<br />

archive timestamp is the result of using the hash algorithm to<br />

the CAdES-X or XadES-X form. The first archive timestamp of<br />

the obtained archival form CAdES or XAdES includes all necessary<br />

information required for every signature verification and<br />

so called an initial archive timestamp. This timestamp can become<br />

invalid when a public key algorithm, or a hash function<br />

used respectively to creation of the hash value or the timestamp:<br />

(5)<br />

(6)<br />

32 ELEKTRONIKA 11/<strong>2009</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!