Location of Repository


By H.M. Gladney


In ancient times, wax seals impressed with signet rings were affixed to documents as evidence of their authenticity. A digital counterpart is a message authentication code fixed firmly to each important document. We sketch an architecture that accomplishes this by using encapsulation of content with provenance metadata, cryptographic sealing, and webs of trust rooted in respected institutions. A prototype will integrate software that is mostly available, will conform to many standards, and will be interoperable over most computing bases. It will avoid administrative overhead inherent in other methods. This synopsis condenses a more detailed manuscript (deposited as #00000008) by omitting details that would obscure the main design features.

Topics: BC Authenticity and Integrity
Year: 2003
OAI identifier: oai:eprints.erpanet.org:18
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://eprints.erpanet.org/18/ (external link)
  • Suggested articles


    1. (1995). A Framework for Distributed Digital Object Services, doi
    2. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C, doi
    3. Authentication of Digital Objects: Lessons from a Historian's Research,
    4. (2000). Authenticity and Integrity in the Digital Environment: An Exploratory Analysis of the Central Role of Trust,
    5. (2001). LOCKSS: A Permanent WWW Publishing and Access System, D-Lib Magazine, doi
    6. (2000). Metadata for the Long Term Preservation of Electronic Publications,
    7. (2001). MetaNet - A Metadata Term Thesaurus to Enable Semantic Interoperability Between Metadata Domains,
    8. (2000). Overview of Certification Systems:
    9. (1996). Preservation doi
    10. (1995). Preserving Digital Information: Report of the Task Force on doi
    11. (2001). Reference Model for an Open Archival Information System (OAIS), doi
    12. (2001). Research Initiatives, Handle System: A general-purpose global name service enabling secure name resolution over the Internet,
    13. (2002). Secure XML: The New Syntax for Signatures and Encryption,
    14. (2000). Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure, doi
    15. (1980). The Art of Japanese Prints, Calmann
    16. (2002). Trusted Digital Repositories: Attributes and Responsibilities,
    17. (2001). Trusting Records in a Post-Modern World, doi
    18. (2003). Trustworthy 100-Year Digital Documents: Evidence Even After Every Witness is Dead, doi
    19. (2003). Trustworthy 100-Year Digital Objects: Durable Encoding for When It's Too Late to Ask, doi
    20. (1998). Uniform Resource Identifiers (URI): Generic Syntax,
    21. (2000). Walking the WWW of Trust,
    22. (2003). What Do We Mean By Authentic? What’s the Real McCoy? DLib Magazine 9(7/8), doi
    23. (2002). YEA: The Yale Electronic Archive, One Year of Progress: Report on the Digital Preservation Planning Project,

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.