Enforcing mandatory and discretionary security in workflow management systems
Journal of Computer Security - Special issue on database security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A Chinese wall security model for decentralized workflow systems
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Hi-index | 0.00 |
In the history of document circulation, many participants may annotate and sign on the document so as to produce a final authentic document. This circulation process requires that a later participant can know the document circulation history, verify all the previous annotations, but can not modify them. To be applicable to devices of limited resources, the document processing approach should be efficient in terms of computational cost and network overhead. This paper extends an aggregate signature scheme so as to combine many signatures into one no matter which kind of circulating route (sequential, parallel, or hybrid) is. Since the proposal enables to manage the documents easily, it is useful and practical in office automation applications.