Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.4.743

Proxy Based Application Digital Signature Validation System  

Kwon, Sangwan (Software R&D Center, Samsung Electronics)
Kim, Donguk (Software R&D Center, Samsung Electronics)
Lee, Kyoungwoo (Department of Computer Science, Yonsei University)
Abstract
As smart phones are becoming popular, an operating system is being used at wearable devices, home appliances and smart TVs. A user is able to use various applications on devices with operating system, but there is an increased threat of hacker. Thus, the technology for detecting the forgery of applications is becoming more important on operating system. To detect the forgery of the application, a digital signature technology is used on the filed of application digital signature. According to W3C recommendation, the signing process of application digital signature must be performed at least twice, and the applications which are signed by the application digital signature have to be validated for all signature files when the application is installed in the operating system. Hence, the performance of the application digital signature validation system is closely related to the installer performance on the operating system. Existing validation system has performance degradation due to redundancy of integrity verification among application components. This research was conducted to improve the performance of the application digital signature validation system. The proposal of validation system which is applied proxy system shows a performance improvement compared to the existing verification system.
Keywords
application digital signature; application integrity; signature validation system;
Citations & Related Records
연도 인용수 순위
  • Reference
1 "XML Digital Signatures for Widgets," https://www.w3.org/TR/widgets-digsig
2 Lijang Yi, Guoqiang Bai and Guozhen Xiao, "Proxy multi-signature scheme: a new type of proxy signature scheme," IEEE Electronics Letters, vol. 36, no. 6, pp. 527-528, Mar. 2000.   DOI
3 Ying Sun, Chunxiang Xu, Qi Xia and Yong Yu, "Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel," Information Assurance and Security 2009. Fifth International Conference on, vol. 2, pp. 661-664, Oct. 2009.
4 Shiangfeng Tzeng, Chengchi Lee and Minshiang Hwang, "A batch verification for multiple proxy signature," Parallel Processing Letters, vol. 21, no. 01, pp. 77-84, Mar. 2011.   DOI
5 "TIZEN W3C API," https://www.tizen.org/tv/w3c_api/
6 "TIZEN Applications Installer," https://wiki.tizen.org/Applications_Installer/
7 Merkle R.C, "A Certified Digital Signature," Advances in Cryptology - CRYPTO' 89 Proceedings, vol. 435, pp. 218-238, Jul. 2001.
8 "XML Signature Syntax and Processing (Second Edition)," https://www.w3.org/TR/xmldsig-core/
9 "XML Schema Part 1: Structures Second Edition," https://www.w3.org/TR/xmlschema-1/
10 "XML Encryption Syntax and Processing," http://www.w3.org/2001/04/xmlenc#sha256
11 "Additional XML Security Uniform Resource Identifiers (URIs)," http://www.ietf.org/rfc/rfc4051.txt