{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T11:01:51Z","timestamp":1777806111964,"version":"3.51.4"},"reference-count":30,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T00:00:00Z","timestamp":1587081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2020,6,19]]},"abstract":"<jats:p>DNA molecules are increasingly being synthesized in the laboratory. A major concern in this domain is that a malicious actor can potentially tweak a benevolent synthesized DNA molecule and create a DNA molecule with harmful properties ( Biodefense in the Age of Synthetic Biology ( 2018 ) The National Academies Press). To detect if a synthesized DNA molecule has been modified from the original version created in the laboratory, the authors in (In Proceedings of the New Security Paradigms Workshop ( 2018 ) ACM) proposed a digital signature protocol for creating a signed DNA molecule. However, several challenges arise in more complex molecules because of various forms of DNA mutations as well as size restrictions of the molecule that impact its properties. The current work extends (In Proceedings of the New Security Paradigms Workshop ( 2018 ) ACM) in several directions to address these problems. A second concern with synthesized DNA is that it is an intellectual property. In order to allow its use by third parties, an annotated document of the molecule needs to be distributed. However, since the molecule and document are two different entities, one being a physical product and the other being a digital one, ensuring that both are distributed correctly together without tampering is challenging. This work also addresess this problem by transforming the document into a DNA molecule and embedding it within the original molecule together with the signature.<\/jats:p>","DOI":"10.3233\/jcs-191383","type":"journal-article","created":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T12:23:04Z","timestamp":1587126184000},"page":"437-467","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Synthesizing DNA molecules with\u00a0identity-based digital signatures to\u00a0prevent\u00a0malicious tampering and enabling source attribution"],"prefix":"10.1177","volume":"28","author":[{"given":"Diptendu Mohan","family":"Kar","sequence":"first","affiliation":[{"name":"Department of Computer Science, Colorado State University, Fort Collins, Colorado, USA. E-mails:\u00a0,\u00a0,\u00a0"}]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Colorado State University, Fort Collins, Colorado, USA. E-mails:\u00a0,\u00a0,\u00a0"}]},{"given":"Jenna","family":"Gallegos","sequence":"additional","affiliation":[{"name":"Department of Chemical and Biological Engineering, Colorado State University, Fort Collins, Colorado, USA. E-mails:\u00a0,\u00a0"}]},{"given":"Jean","family":"Peccoud","sequence":"additional","affiliation":[{"name":"Department of Chemical and Biological Engineering, Colorado State University, Fort Collins, Colorado, USA. E-mails:\u00a0,\u00a0"},{"name":"GenoFAB, Inc., Fort Collins, Colorado, USA"}]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Colorado State University, Fort Collins, Colorado, USA. E-mails:\u00a0,\u00a0,\u00a0"}]}],"member":"179","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref002","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_2"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1145\/363958.363994"},{"key":"ref004","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1101\/750927"},{"key":"ref006","doi-asserted-by":"publisher","DOI":"10.1126\/science.1190719"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-8-176"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1126\/science.aad6253"},{"issue":"142","key":"ref009","first-page":"547","volume":"37","author":"Jaccard P.","year":"1901","journal-title":"Bulletin de la Societe Vaudoise des Sciences Naturelles"},{"issue":"140","key":"ref010","first-page":"241","volume":"37","author":"Jaccard P.","year":"1901","journal-title":"Bulletin de la Societe Vaudoise des Sciences Naturelles"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1989.10478785"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1371\/journal.ppat.1000950"},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.1145\/3285002.3285007"},{"issue":"8","key":"ref014","first-page":"707","volume":"10","author":"Levenshtein V.I.","year":"1966","journal-title":"Soviet Physics Doklady"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0042465"},{"key":"ref016","unstructured":"S.\u00a0Nakamoto, Bitcoin: A peer-to-peer electronic cash system, Bitcoin.org Working Paper, 2008."},{"key":"ref017","doi-asserted-by":"publisher","DOI":"10.17226\/24890"},{"key":"ref018","unstructured":"P.\u00a0Ney, K.\u00a0Koscher, L.\u00a0Organick, L.\u00a0Ceze and T.\u00a0Kohno, Computer security, privacy, and DNA sequencing: Compromising computers with synthesized DNA, privacy leaks, and more, in: Proceedings of the 26th USENIX Security Symposium, Vancouver, Canada, 2017."},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-05378-z"},{"key":"ref020","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020682"},{"key":"ref021","doi-asserted-by":"publisher","DOI":"10.1016\/j.tibtech.2017.10.012"},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199709)27:9<995::AID-SPE111>3.0.CO;2-6"},{"key":"ref023","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaf4557"},{"key":"ref025","unstructured":"R.\u00a0Sakai and M.\u00a0Kasahara, ID based cryptosystems with pairing on elliptic curve, IACR Cryptology ePrint Archive, 2003."},{"key":"ref026","unstructured":"R.\u00a0Sakai, K.\u00a0Ohgishi and M.\u00a0Kasahara, Cryptosystems based on pairing, in: Proceedings of the 2000 Symposium on Cryptography and Information Security, Okinawa, Japan, 2000."},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref028","first-page":"1","volume":"151","author":"Wood G.","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2002.808397"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-019-2819-0"}],"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-191383","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCS-191383","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-191383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:45:23Z","timestamp":1777495523000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-191383"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,17]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,6,19]]}},"alternative-id":["10.3233\/JCS-191383"],"URL":"https:\/\/doi.org\/10.3233\/jcs-191383","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"value":"0926-227X","type":"print"},{"value":"1875-8924","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,17]]}}}