The Possible Laws on Digital/Electronic Signature: On the Proposed UNCITRAL Model
نویسنده
چکیده
What is the connection between the UNCITRAL model for electronic commerce laws and the U.S. 2000 presidential election imbroglio? How does this connection, if recognized, resonates certain milestones of our civilization's heritage, legacies from the Phoenicians and from the Roman empire? There is something basic about human communication and reasoning which weaves through these themes, in the way our languages work: trust. And the moment seems ripe for reflecting upon the weaving of trust thus produced. This article offers some personal views on an astonishingly neglected dimension of the virtualization of our social processes, set in motion by the digital revolution, in which the underlying texture of trust ceases to be treated as a transparent veil.
منابع مشابه
Rules for Electronic Platforms: the role of platforms and intermediaries in digital economy A Case for Harmonization
UNCITRAL texts on electronic commerce successfully addressed and effectively tackled the challenges posed by the use of electronic communications in the formation and the performance of contracts. These are essentially ‘transaction-oriented’ rules and represent the first generation of e-commerce law. The accelerated evolution of digital economy has shown that technology is not only transforming...
متن کاملE-Signature Use in China: Four Case Studies
The Electronic Signature Law of the People’s Republic of China has been implemented for over seven years. However, a wide variety of legal problems exists. This paper analyzes four cases about e-signature use in China that covers four different areas: E-mail, short text message, E-banking, and online shopping. Various solutions to problems concerning e-signature use are also discussed. DOI: 10....
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملA Novel Patch-Based Digital Signature
In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کامل