WEKO3
-
RootNode
アイテム
A Chameleon Hash-based Method for Proving Execution of Business Processes
https://ipsj.ixsq.nii.ac.jp/records/220194
https://ipsj.ixsq.nii.ac.jp/records/2201948e3408f7-add4-4e1c-b2a8-46e21257ccab
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2022 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | Journal(1) | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2022-09-15 | |||||||||||||||||
タイトル | ||||||||||||||||||
タイトル | A Chameleon Hash-based Method for Proving Execution of Business Processes | |||||||||||||||||
タイトル | ||||||||||||||||||
言語 | en | |||||||||||||||||
タイトル | A Chameleon Hash-based Method for Proving Execution of Business Processes | |||||||||||||||||
言語 | ||||||||||||||||||
言語 | eng | |||||||||||||||||
キーワード | ||||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | [特集:量子時代をみすえたコンピュータセキュリティ技術] business process, workflow, electronic contract, trust service, chameleon hash, TaaS (Trust as a Service) | |||||||||||||||||
資源タイプ | ||||||||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||||||
資源タイプ | journal article | |||||||||||||||||
著者所属 | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者所属 | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者所属 | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者所属 | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者所属 | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者所属 | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者所属(英) | ||||||||||||||||||
en | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者所属(英) | ||||||||||||||||||
en | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者所属(英) | ||||||||||||||||||
en | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者所属(英) | ||||||||||||||||||
en | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者所属(英) | ||||||||||||||||||
en | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者所属(英) | ||||||||||||||||||
en | ||||||||||||||||||
Fujitsu Limited | ||||||||||||||||||
著者名 |
Tadanobu, Tsunoda
× Tadanobu, Tsunoda
× Kazuaki, Nimura
× Dai, Yamamoto
× Koichi, Yasaki
× Rikuhiro, Kojima
× Yosuke, Nakamura
|
|||||||||||||||||
著者名(英) |
Tadanobu, Tsunoda
× Tadanobu, Tsunoda
× Kazuaki, Nimura
× Dai, Yamamoto
× Koichi, Yasaki
× Rikuhiro, Kojima
× Yosuke, Nakamura
|
|||||||||||||||||
論文抄録 | ||||||||||||||||||
内容記述タイプ | Other | |||||||||||||||||
内容記述 | Remote work is becoming common for many companies due to the impact of the COVID-19 pandemic. Companies need to be able to operate every business process with high reliability, even in circumstances where lack of direct conversation or cross-checking makes it difficult to confirm or verify the works have been done correctly. In recent years, cloud-based electronic contract services have emerged, and by executing business processes in accordance with workflows in the cloud, it is possible to prove the execution of business processes even in a remote work environment. However, when a person uses a cloud-based electronic contract service that signs digitally without his/her own signature key, there is a problem associated with the reliability; nobody can prove the business processes have been really executed based on the person's own intention. One way to solve the problem is to apply a principal-signing electronic contract service or a client-side trivial digital signature scheme. However, these do not provide direct proof that the business processes have been done by pre-assigned members. In this paper we propose a chameleon hash-based method for proving execution of business processes. This method makes it very easy for a verifier to prove that a series of business processes in a workflow, including identity authentication, document edits and approval, have been executed by “the principals who are designated in advance”. In addition, since this method can prove that the principal has the intention of editing the document, it is possible to show the authenticity of the document in accordance with the recent interpretation of the Act on Electronic Signatures and Certification Business. We have developed a prototype system and implemented this method. We have confirmed that the prototype system has been able to compute the proposed method at high speed without burdening the PC during editing business documents in our daily works, and to easily verify that the processes have been executed correctly. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.30(2022) (online) DOI http://dx.doi.org/10.2197/ipsjjip.30.613 ------------------------------ |
|||||||||||||||||
論文抄録(英) | ||||||||||||||||||
内容記述タイプ | Other | |||||||||||||||||
内容記述 | Remote work is becoming common for many companies due to the impact of the COVID-19 pandemic. Companies need to be able to operate every business process with high reliability, even in circumstances where lack of direct conversation or cross-checking makes it difficult to confirm or verify the works have been done correctly. In recent years, cloud-based electronic contract services have emerged, and by executing business processes in accordance with workflows in the cloud, it is possible to prove the execution of business processes even in a remote work environment. However, when a person uses a cloud-based electronic contract service that signs digitally without his/her own signature key, there is a problem associated with the reliability; nobody can prove the business processes have been really executed based on the person's own intention. One way to solve the problem is to apply a principal-signing electronic contract service or a client-side trivial digital signature scheme. However, these do not provide direct proof that the business processes have been done by pre-assigned members. In this paper we propose a chameleon hash-based method for proving execution of business processes. This method makes it very easy for a verifier to prove that a series of business processes in a workflow, including identity authentication, document edits and approval, have been executed by “the principals who are designated in advance”. In addition, since this method can prove that the principal has the intention of editing the document, it is possible to show the authenticity of the document in accordance with the recent interpretation of the Act on Electronic Signatures and Certification Business. We have developed a prototype system and implemented this method. We have confirmed that the prototype system has been able to compute the proposed method at high speed without burdening the PC during editing business documents in our daily works, and to easily verify that the processes have been executed correctly. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.30(2022) (online) DOI http://dx.doi.org/10.2197/ipsjjip.30.613 ------------------------------ |
|||||||||||||||||
書誌レコードID | ||||||||||||||||||
収録物識別子タイプ | NCID | |||||||||||||||||
収録物識別子 | AN00116647 | |||||||||||||||||
書誌情報 |
情報処理学会論文誌 巻 63, 号 9, 発行日 2022-09-15 |
|||||||||||||||||
ISSN | ||||||||||||||||||
収録物識別子タイプ | ISSN | |||||||||||||||||
収録物識別子 | 1882-7764 | |||||||||||||||||
公開者 | ||||||||||||||||||
言語 | ja | |||||||||||||||||
出版者 | 情報処理学会 |