CFP last date
20 January 2025
Reseach Article

Design Printed Signature Protocol based on a Blockchain Concept

by Aslan Alwi, Julan Hernadi, Munirah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 17
Year of Publication: 2022
Authors: Aslan Alwi, Julan Hernadi, Munirah
10.5120/ijca2022922167

Aslan Alwi, Julan Hernadi, Munirah . Design Printed Signature Protocol based on a Blockchain Concept. International Journal of Computer Applications. 184, 17 ( Jun 2022), 6-12. DOI=10.5120/ijca2022922167

@article{ 10.5120/ijca2022922167,
author = { Aslan Alwi, Julan Hernadi, Munirah },
title = { Design Printed Signature Protocol based on a Blockchain Concept },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2022 },
volume = { 184 },
number = { 17 },
month = { Jun },
year = { 2022 },
issn = { 0975-8887 },
pages = { 6-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number17/32408-2022922167/ },
doi = { 10.5120/ijca2022922167 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:21:39.865360+05:30
%A Aslan Alwi
%A Julan Hernadi
%A Munirah
%T Design Printed Signature Protocol based on a Blockchain Concept
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 17
%P 6-12
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For a certain reason, usually an agency validates certain document sheets using a printed signature, for example the Dukcapil Office in signing a family card. The printed signature here uses a Qr-Code or barcode instead of a wet signature. Verification of the printed signature is done by scanning a Qr-Code or barcode which triggers the appearance of a website page stating the validity of the printed signature. One of the disadvantages of printed signatures is that they are vulnerable to tampering, such as transferring signatures for unauthorized documents. This is because the signature authenticity validation authority is single. This article introduces a blockchain-based signature protocol that is believed to be able to guarantee the security of printed signatures and the document itself. The security guarantee here is because the validation authority holder is not single but is distributed among the various parties involved.

References
  1. N. Sargunaraj, “Electronic & Digital Signatures in ASEAN,” ASEAN, p. 5, 2020.
  2. PRESIDEN REPUBLIK INDONESIA, “UNDANG- UNDANG REPUBLIK INDONESIA NOMOR 11 TAHUN 2008 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK,” LEMBARAN NEGARA REPUBLIK INDONESIA NOMOR 4643. TAMBAHAN LEMBARAN NEGARA REPUBLIK INDONESIA NOMOR 4843, 2008.
  3. PRESIDEN REPUBLIK INDONESIA, “PERATURAN PEMERINTAH REPUBLIK INDONESIA NOMOR 82 TAHUN 2012 TENTANG PENYELENGGARAAN SISTEM DAN TRANSAKSI ELEKTRONIK.” TAMBAHAN LEMBARAN NEGARA REPUBLIK INDONESIA NOMOR 5348, 2012.
  4. Kemkominfo, “Undang-Undang Republik Indonesia Nomor 19 Tahun 2016 Tentang Informasi Dan Transaksi Elektronik,” UU No. 19 tahun 2016, no. 1, pp. 1–31, 2016.
  5. D. Ankaa Wijaya, F. Junis, and D. Ariadi Suwarsono, “SMART STAMP DUTY,” in Seminar Nasional Perpajakan 2018, 2018, pp. 1–12.
  6. Zakiyah, R. A. Insyirah, and A. Maulana, “Kajian Yuridis Keberadaan Tanda Tangan Yang Dibuat Dengan Menggunakan Alat Pemindai (Scanner) Dalam SebuahPerjanjian,” pp. 1–60, 2019.
  7. H. Hudzaifah, “Keabsahan Tanda Tangan Elektronik Dalam Pembuktian Hukum Acara Perdata Indonesia,” Katalogis, vol. 3, no. 5, pp. 194–204, 2015.
  8. Y. Yanovich, I. Shiyanov, T. Myaldzin, I. Prokhorov, D. Korepanova, and S. Vorobyov, “Blockchain-based supply chain for postage stamps,” Informatics, vol. 5, no. 4, Nov. 2018.
  9. A. Argani and W. Taraka, “Pemanfaatan Teknologi Blockchain Untuk Mengoptimalkan Keamanan Sertifikat Pada Perguruan Tinggi,” ADI Bisnis Digit. InterdisiplinJ., vol. 1, no. 1, pp. 10–21, 2020.
  10. S. N. Billah, R. Pollobe, F. Hossain, N. M. Abir, A. Z. Zarin, and M. F. Mridha, “Blockchain Based Architecture for Certificate Authentication,” SSRN Electron. J., 2021.
  11. M. Garriga, M. Arias, and A. De Renzis, “Blockchain and Cryptocurrency: A comparative framework of themain Architectural Drivers,” 2018.
  12. Y. Zhang, C. Xu, N. Cheng, H. Li, H. Yang, and X. Shen, “Chronos+: An Accurate Blockchain-Based Time- Stamping Scheme for Cloud Storage,” IEEE Trans. Serv. Comput., vol. 13, no. 2, pp. 216–229, Mar. 2020.
  13. W. Detho, “Developing a system for securely time- stamping and visualizing the changes made to online news content Master Thesis,” Universitat Konstanz, 2016.
  14. S. Nakamoto, “Bitcoin : A Peer-to-Peer Electronic Cash System,” pp. 1–9, 2008.
  15. P. Freni, E. Ferro, and R. Moncada, “Tokenomics and blockchain tokens: A design-oriented morphological framework,” Blockchain Res. Appl., vol. 3, no. 1, p. 100069, 2022
  16. Z. Wang, Q. Hu, Y. Wang, and Y. Xiao, “Transaction pricing mechanism design and assessment for blockchain,” High-Confidence Comput., vol. 2, no. 1, p. 100044, 2022.
  17. Abadeh, “Blockchain and medicine : From digital promise to frontline practice,” Ann. Med. Surg., vol. 76, no. April, p. 103555, 2022.
  18. Haq and O. M. Esuka, “Blockchain Technology in Pharmaceutical Industry to Prevent Counterfeit Drugs Blockchain Technology in Pharmaceutical Industry to Prevent Counterfeit Drugs,” no. April, 2018.
  19. M. A. N. Agi and A. K. Jha, “Blockchain technology in the supply chain: An integrated theoretical perspective of organizational adoption,” Int. J. Prod. Econ., vol. 247, no. June 2021, p. 108458, 2022.
  20. M. T. Al Ahmed, F. Hashim, S. Jahari Hashim, and A. Abdullah, “Hierarchical blockchain structure for node authentication in IoT networks,” Egypt. Informatics J., no. xxxx, 2022.
  21. M. Foy, D. Martyn, D. Daly, A. Byrne, C. Aguneche, and R. Brennan, “Blockchain-based governance models for COVID-19 digital health certificates: A legal, technical, ethical and security requirements analysis,” Procedia Comput. Sci., vol. 198, no. 2021, pp. 662 – 669, 2021.
  22. Y. Guo, Z. Wan, and X. Cheng, “When Blockchain Meets Smart Grids: A Comprehensive Survey,” High- Confidence Comput., p. 100059, 2022.
  23. E. Maguire, D. Hicks, W. Keat Ng, T. Yew Chia, and S. Marshall, “Could blockchain be the foundation of a viable KYC utility?,” KPMG Int., pp. 1–8, 2018
  24. R. Zhang, R. Xue, and L. Liu, “Security and privacy on blockchain,” ACM Comput. Surv., vol. 52, no. 3, 2019.
  25. R. Stephen and A. Alex, “A Review on BlockChain Security,” IOP Conf. Ser. Mater. Sci. Eng., vol. 396, no. 1, 2018.
Index Terms

Computer Science
Information Sciences

Keywords

Printed Signature Protocol Blockchain Validation Verification Authority.