Acta Informatica Pragensia 2015, 4(3), 302-309 | DOI: 10.18267/j.aip.763017
Verifiable Distribution of Material Goods Based on Cryptology
- Department of Information and Knowledge Engineering, Faculty of Informatics and Statistics, University of Economics, Prague, nám. W. Churchilla 4, 130 67 Praha 3, Czech Republic
Counterfeiting of material goods is a general problem. In this paper an architecture for verifiable distribution of material goods is presented. This distribution is based on printing such a QR code on goods, which would contain digitally signed serial number of the product, and validity of this digital signature could be verifiable by a customer. Extension consisting of adding digital signatures to revenue stamps used for state-controlled goods is also presented. Discussion on possibilities in making copies leads to conclusion that cryptographic security needs to be completed by technical difficulties of copying.
Keywords: Digital signature, Verifiable distribution, Material goods, QR code, Revenue stamp
Received: September 29, 2015; Revised: December 23, 2015; Accepted: December 26, 2015; Published: December 31, 2015 Show citation
References
- Adams, C., Cain, P., Pinkas, D., & Zuccherato, R. (2001). RFC 3161: Internet X. 509 public key infrastructure timestamp protocol (TSP). Retrieved from https://www.ietf.org/rfc/rfc3161.txt
- Baker, S. A., & Hurst, P. R. (1998). The limits of trust: cryptography, governments, and electronic commerce. Boston: Kluwer Law International.
- Boneh, D., & Boyen, X. (2004). Short signatures without random oracles. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (pp. 56-73). New York: Springer. doi: 10.1007/978-3-540-24676-3_4
Go to original source...
- Boneh, D., Lynn, B., & Shacham, H. (2004). Short Signatures from the Weil Pairing. Journal of Cryptology, 17(4), 297-319. doi: 10.1007/s00145-004-0314-9
Go to original source...
- Hrubý, J., & Mokoš, I. (2001). K zákonu o elektronickém podpisu, jeho dopadu na ekonomiku a bezpečnostních hlediscích. Crypto-World, 3(2), 7-14.
- ISO 18004, (2006). ISO/IEC 18004: Information Technology-Automatic Identification and Data Capture Techniques-QR Code Bar Code Symbology Specification. Retrieved from http://www.iso.org/iso/catalogue_detail?csnumber=43655
- Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 1(1), 36-63. doi: 10.1007/s102070100002
Go to original source...
- ISO 18014. (2008). ISO/IEC 18014-1:2008 Information technology - Security techniques - Time-stamping services - Part 1: Framework. Retrieved from https://www.iso.org/obp/ui/#iso:std:50678:en
- Pfitzmann, B. (1996). Digital Signature Schemes: General Framework and Fail-Stop Signatures. New York: Springer.
Go to original source...
- Schneier, B. (2007). Applied cryptography: protocols, algorithms, and source code in C. New York: John Wiley & Sons.
- Smid, M. E., & Branstad, D. K. (1993). Response to comments on the NIST proposed Digital Signature Standard. In Proceedings of the 12th Annual International Cryptology Conference (pp. 76-88). New York: Springer. doi: 10.1007/3-540-48071-4_6
Go to original source...
- Tvrdíková, M. (2003). Správa digitálních dokumentů. In Proceedings of the Systems Integration Conference (pp. 586-591). Praha: Vysoká škola ekonomická v Praze.
- Zhang, M., Yang, B., Zhong, Y., Li, P., & Takagi, T. (2011). Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings. International Journal of Network Security, 12(2), 159-165.
This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.