Jean-François Blanchette
- Published in print:
- 2012
- Published Online:
- August 2013
- ISBN:
- 9780262017510
- eISBN:
- 9780262301565
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262017510.003.0004
- Subject:
- Information Science, Information Science
This chapter examines the gradual crystallization of a cryptographic model for an electronic equivalent to handwritten signatures. It suggests that market demise of public-key infrastructures ...
More
This chapter examines the gradual crystallization of a cryptographic model for an electronic equivalent to handwritten signatures. It suggests that market demise of public-key infrastructures provided a powerful critique of the digital signature model and contends that the difficulties met in translating this model into a commercially successful technology may be attributed to cryptographers’ problematic relationship with the representational nature of models. It also discusses the trade-offs in the mathematization of cryptography.Less
This chapter examines the gradual crystallization of a cryptographic model for an electronic equivalent to handwritten signatures. It suggests that market demise of public-key infrastructures provided a powerful critique of the digital signature model and contends that the difficulties met in translating this model into a commercially successful technology may be attributed to cryptographers’ problematic relationship with the representational nature of models. It also discusses the trade-offs in the mathematization of cryptography.
Jean-François Blanchette
- Published in print:
- 2012
- Published Online:
- August 2013
- ISBN:
- 9780262017510
- eISBN:
- 9780262301565
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262017510.003.0008
- Subject:
- Information Science, Information Science
This chapter explores the application of cryptography in voting technologies. It suggests that the widespread adoption of these technologies are likely to face similar difficulties as the ...
More
This chapter explores the application of cryptography in voting technologies. It suggests that the widespread adoption of these technologies are likely to face similar difficulties as the cryptographic signature model because they are designed based on similar assumptions. It also highlights the need for cryptographers to address the design blind spots in order to help reinvigorate their sociotechnical agenda.Less
This chapter explores the application of cryptography in voting technologies. It suggests that the widespread adoption of these technologies are likely to face similar difficulties as the cryptographic signature model because they are designed based on similar assumptions. It also highlights the need for cryptographers to address the design blind spots in order to help reinvigorate their sociotechnical agenda.