Secure offline legitimation systems
نویسنده
چکیده
rganizing the interdependencies within and between communities is one of the ongoing challenges of mankind. Once organizations are formed, companies run their businesses, and a legal system is in place, there is an urgent need for procedures to perform legally binding transactions. This in turn brings up the need for unforgeable documents or tokens of legitimation. Traditional examples are letters and cheques with handwritten signatures or seals, hard-to-counterfeit bills, drivers licences and passports with hardly removable pictures imprinted, etc. The implementations of legitimations change as the technological paradigms change, but the need for legitimations persists. In information societies, many of the traditional implementations are obsolete because they are no longer efficient and often too costly. In addition, information technology often provides better approximations to the ideal properties of legitimations, e.g. unforgeability. Electronic commerce is one if not the pioneering area where the new implementations of legitimations are developed, tested and put into everyday’s practice. Examples are electronic wallets, phone cards, e-cash, e-tickets, etc. While an amount of money can be regarded as a legitimation to consume a corresponding portion of the national gross product, there are also other kinds of legitimations. This work starts by categorizing them and identifying important examples in real life. Namely, we distinguish personal and coin legitimations. The former cannot be transferred between holders and the latter cannot be used more often than a pre-specified limit. Orthogonal to these categories then are privacy requirements. This is where electronic implementations are really superior to traditional implementations: Not only are they more efficient, but they can achieve more privacy for holders of legitimations than the conventional paper based implementations can. Such electronic implementations have been introduced in 1985 by Chaum [60] as credentials. Holders can get a credential from an issuer and later show it to a verifier without letting the issuer and verifiers recognize that they have issued and verified a credential of the same holder (unlinkability). Although several cryptographic mechanisms for credentials have been suggested since, formal definitions have been given only for the special case of electronic cash. We propose a formal modular framework to define the different categories of credentials sketched above (including electronic cash). Furthermore, we suggest the first mechanism for personal credentials that can be shown many times in an unlinkable way. In order to achieve non-transferability, we suggest the use of O
منابع مشابه
A case study of the process of achieving legitimation in information systems development
Social and organizational issues are important in developing successful information systems in organizations. In the past, several approaches have been used to investigate these issues, but more recently an emerging and promising approach is to use Structuration Theory (ST). ST is acknowledged as a powerful approach but needs careful operationalization; consequently, the empirical application o...
متن کاملA case study of the legitimation process undertaken to gain support for an information system in a Chinese university
Received: 14 May 2009 Revised: 18 January 2010 2nd Revision: 28 February 2011 3rd Revision: 19 May 2011 Accepted: 20 May 2011 Abstract This research examines the legitimation process that was undertaken to gain stakeholder support for the development of a smartcard system for student services at a local university in China. We employed a theoretical framework consisting of Suchman’s typology of...
متن کاملExploring the legitimation seeking Activities in an Information System Project
Introducing new Information Systems (IS) to organizations often brings changes to the status quo and IS managers need to gain acceptance and support from stakeholders. Legitimation is an abstraction of formal and informal approval of stakeholders toward organizational activities. Our research motivation is to demonstrate that a process-based understanding of legitimation-seeking activities is i...
متن کاملThe legitimation-seeking process in information systems development
We investigate the importance of legitimation-seeking in IS development by describing two related projects in the Central Hospital, Bangkok. In the second project, begun immediately after the first, there were major improvements in legitimation-seeking activities and the implemented IS was a success, providing strong evidence that stakeholders perceived a direct link between legitimation failur...
متن کاملSeeking legitimation for an information system: a preliminary process model
This research throws light on to the role of social issues in developing a successful information system. In a case study of a community health organization, we describe how IT management carried out an integrated set of actions over a two-year period to obtain legitimation for an Intranet system from its eventual stakeholders. We suggest that, in general, a failure to obtain such legitimation ...
متن کامل