The digital signature dilemma Le dilemme de la signature numérique
نویسنده
چکیده
The last ten years have seen an enormous amount of legal, regulatory, and technological activity aimed at designing a proper electronic equivalent to handwritten signatures. One such design, that of cryptology-based (or digital) signatures, has succeeded over other solutions to the point where, in certain legal systems, such as those of the Member States of the European Union, electronic signatures are almost exclusively understood to be based on public-key cryptography. Yet, several archival institutions (including the National Archives of Canada, Australia and the US) have expressed ambivalence at the prospect of preserving digitally signed records. This paper argues that discrepancies between technical, legal and archival responses to the problem of long-term preservation of digitally signed documents are founded on diverging understandings — physical vs. contextual — of electronic authenticity.
منابع مشابه
The Table Maker's Dilemma the Table Maker's Dilemma
The Table Maker's Dilemma is the problem of always getting correctly rounded results when computing the elementary functions. After a brief presentation of this problem, we present new developments that have helped us to solve this problem for the double-precision exponential function in a small domain. These new results show that this problem can be solved, at least for the double-precision fo...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملA Novel Patch-Based Digital Signature
In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...
متن کاملDigital Control Strategies for DC/DC SEPIC Converters towards Integration Stratégies de Commande Numérique pour un Convertisseur DC/DC SEPIC en vue de l’Intégration
Présentée devant L’INSTITUT NATIONAL DES SCIENCES APPLIQUÉES DE LYON Pour obtenir LE GRADE DE DOCTEUR École Doctorale: ELECTRONIQUE, ELECTROTECHNIQUE, AUTOMATIQUE (E.E.A.) Spécialité: GÉNIE ELECTRIQUE par Nan Li ————————————————————————————————————— Digital Control Strategies for DC/DC SEPIC Converters towards Integration Stratégies de Commande Numérique pour un Convertisseur DC/DC SEPIC en vue...
متن کاملISSN 0832-7203 An Automatic Validation Model for Security Mechanisms
In this paper, we propose a model to automatically validate the composition of multiple security mechanisms in the context of transactions between multiple participants. The goal of the validation is to demonstrate that the different security mechanisms preserve conformity to their specifications when used in combination. The underlying principle of the proposed approach is illustrated with a c...
متن کامل