The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Design and Construction of Secure Digital Will System

,
The rapid growth of network communications has made applications of electronic commerce the future trend of commercial activities. To ensure the effectiveness of transactions, governments put the electronic signature law into practice. They also proposed guiding or assisting projects to encourage or help enterprises and organizations to construct secure electronic environments. Because of the availability and ease of use of information infrastructure, human’s daily life is increasingly digitalized. With the promotion of life education and religious groups, people have gradually accepted the concept of writing down wills before their death, which can reduce conflicts and arguments for inheritance. A legitimate will can be produced with the witness of notaries in the court or the notary public offices. If a testator wishes to modify his will, he must perform again the procedures above. Since, it requires some fees as well as transportation costs for notaries and witnesses, the generation of a traditional will is rather costly. It might also be inefficient for its complicated witnessing procedures. Currently, the electronic Wills Act is under discussions, but not put into practice yet. To date, there are no literatures discussing the issues of digital will. The properties of security, convenience and effectiveness are the most significant reasons why people would like to adopt the digital will mechanism in the future. Based on the mechanisms of public key infrastructure and key escrow systems, we constructed a secure and realistic model for a digital will system which fulfills the above-mentioned properties and is suitable for practical implementation.


[1] Ali Z. and Ahmed J., New Computation Technique for Encryption and Decryption based on RSA and ElGamal Cryptosystems, Journal of Theoretical and Applied Information Technology, vol. 47, no. 1, pp. 73-79, 2013.

[2] Choi J. and Jung S., A Handover Authentication using Credentials based on Chameleon Hashing, IEEE Communications Letters, vol. 14, no. 1, pp. 54-56, 2010.

[3] Civil Code, Laws and Regulations Database of The Republic of China, available at http://law.moj. gov.tw/Eng/LawClass/LawContent.aspx?pcode= B0000001, last visited 2013.

[4] Damgard I. and Thorbek R., Linear Integer Secret-Sharing and Distributed Exponentiation, in Proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, pp. 75-90, 2006.

[5] Diffie W. and Hellman M., New Directions in Cryptography, IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976.

[6] Elgamal T., A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms, IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, 1985.

[7] Fan R., Chen Y., and Shao J., The Study of Testamentary Trust Business, available at http://www.trust.org.tw/files/981202.pdf, last visited 2014.

[8] Harn L. and Lin C., Authenticated Group Key Transfer Protocol based on Secret Sharing, IEEE Transactions on Computers, vol. 59, no. 6, pp. 842-846, 2010.

[9] ISO/IEC 9594-8., Information Technology- Open Systems Interconnection-The Directory: Authentication Framework, available at: https://www.itu.int/rec/T-REC-X.509, last visited 1998.

[10] ISO 7498-2, Information processing systems- Open Systems Interconnection-Basic Reference Model- Part 2: Security Architecture, available at: www.iso.org/iso/ catalogue_detail.htm? csnumber=14256, last visited 1989.

[11] Lin H., Toward Secure Strong Designated Verifier Signature Scheme from Identity-based System, The International Arab Journal of Information Technology, vol. 11, no. 4, pp. 530 The International Arab Journal of Information Technology, Vol. 13, No. 5, September 2016 315-321, 2014.

[12] Lin H., Wu T., and Huang S., Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs, Journal of Information Science and Engineering, vol. 28, no. 4, pp. 739-753, 2012.

[13] Micali S., Fair Public-Key Cryptosystems, in Proceedings of the 12th Annual International Cryptology Conference Santa Barbara, California, pp. 113-138, 1992.

[14] Rivest R., Shamir A., and Adleman L., A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.

[15] Rivest R., Shamir A., and Tauman Y., How to Leak a Secret, in Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, pp. 552-565, 2001.

[16] Shamir A., How to Share a Secret, Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.

[17] Stallings W., Cryptography and Network Security: Principles and Practices, Prentice Hall, 2010.

[18] Testamentary Trusts Bank., available at https://www.cathaybk.com.tw/cathaybk/trust/trus t_2_1_4.asp, last visited 2014.

[19] Wu T., Lin H. and Ting P., A Publicly Verifiable PCAE Scheme for Confidential Applications with Proxy Delegation, Transactions on Emerging Telecommunications Technologies, vol. 23, no. 2, pp. 172-185, 2012. Tzong-Sun Wu received his BS degree in Electrical Engineering from National Taiwan University, Taiwan in 1990 and his PhD degree in Information Manage-ment from National Taiwan University of Science and Technology, Taiwan in 1998. From August 1998 to July 2001, he has been an Assistant Professor in the Department of Information Management, Huafan University. From August 2001 to January 2007, he has been an Associate Professor in the Department of Informatics, Fo Guang University. Currently, he is with the Department of Computer Science and Engineering, National Taiwan Ocean University, Taiwan. His research interests include information security, watermarking, digital right management, and e-commerce. Yih-Sen Chen received his BA degree in Information Manage-ment from Aletheia University, Taiwan in 1997, his MS degree in Informatics from Fo Guang University, Taiwan in 2006, and PhD degrees in Computer Science and Engineering from National Taiwan Ocean University, Taiwan in 2014. He is now an Assistant Engineer in the Department of Rapid Transit Systems, Taipei City Government. His current research interests include cryptography, information theory, security management, and network security. Han-Yu Lin received his PhD degree in Computer Science and Engineering from the National Chiao Tung University, Taiwan in 2010. He served as a part-time Assistant Professor in both the Department of Information Mana- gement, Chang Gung University, Taiwan and the Department of Information Management, Kainan University, Taiwan from 2011. He has been an Engineer in CyberTrust Technology Institute, Institute for Information Industry, Taiwan from January 2012 to July 2012. Since August 2012, he has been an Assistant Professor in the Department of Computer Science and Engineering, National Taiwan Ocean University, Taiwan. His research interests include cryptology, network security, digital forensics, RFID privacy and application, cloud computing security and e-commerce security.