This program is a prototype implementation of a secure digital provenance scheme outlined by Rangwala et al.(2014). This scheme uses a chain of cryptographic hashes in order to provide an unforgeable chain of custody. In this way, all actions performed on a digital object are recorded and verifiable through an audit. Reference: Rangwala, M., Liang, Z., Peng, W., Zou, X., & Li, F. (2014). A Mutual Agreement Signature Scheme for Secure Data Provenance.