Keith M. Martin
- Published in print:
- 2012
- Published Online:
- December 2013
- ISBN:
- 9780199695591
- eISBN:
- 9780191774898
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199695591.003.0007
- Subject:
- Mathematics, Applied Mathematics
This chapter examines digital signature schemes, the main cryptographic mechanisms for providing non-repudiation of data. It first looks at general requirements for a digital signature scheme. It ...
More
This chapter examines digital signature schemes, the main cryptographic mechanisms for providing non-repudiation of data. It first looks at general requirements for a digital signature scheme. It then considers the ways in which a digital signature scheme could be realised. It discusses digital signature schemes based on RSA and digital signature schemes in practice.Less
This chapter examines digital signature schemes, the main cryptographic mechanisms for providing non-repudiation of data. It first looks at general requirements for a digital signature scheme. It then considers the ways in which a digital signature scheme could be realised. It discusses digital signature schemes based on RSA and digital signature schemes in practice.
Keith M. Martin
- Published in print:
- 2017
- Published Online:
- July 2017
- ISBN:
- 9780198788003
- eISBN:
- 9780191829956
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198788003.003.0007
- Subject:
- Mathematics, Computational Mathematics / Optimization, Logic / Computer Science / Mathematical Philosophy
In this chapter, we discuss digital signature schemes. We start by considering the general requirements of a digital signature scheme. We show first that a digital signature scheme could be ...
More
In this chapter, we discuss digital signature schemes. We start by considering the general requirements of a digital signature scheme. We show first that a digital signature scheme could be established using symmetric techniques. We then consider the more conventional use of public-key cryptography to create digital signature schemes. We compare two different approaches to building a digital signature scheme and illustrate how to manifest these using RSA. We then discuss practical issues concerning digital signature schemes, including different aspects of their security. We close by providing a detailed comparison between digital signatures and handwritten signatures which serves to both illustrate the strengths and vulnerabilities of digital signature schemes.Less
In this chapter, we discuss digital signature schemes. We start by considering the general requirements of a digital signature scheme. We show first that a digital signature scheme could be established using symmetric techniques. We then consider the more conventional use of public-key cryptography to create digital signature schemes. We compare two different approaches to building a digital signature scheme and illustrate how to manifest these using RSA. We then discuss practical issues concerning digital signature schemes, including different aspects of their security. We close by providing a detailed comparison between digital signatures and handwritten signatures which serves to both illustrate the strengths and vulnerabilities of digital signature schemes.
Jean-François Blanchette
- Published in print:
- 2012
- Published Online:
- August 2013
- ISBN:
- 9780262017510
- eISBN:
- 9780262301565
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262017510.003.0004
- Subject:
- Information Science, Information Science
This chapter examines the gradual crystallization of a cryptographic model for an electronic equivalent to handwritten signatures. It suggests that market demise of public-key infrastructures ...
More
This chapter examines the gradual crystallization of a cryptographic model for an electronic equivalent to handwritten signatures. It suggests that market demise of public-key infrastructures provided a powerful critique of the digital signature model and contends that the difficulties met in translating this model into a commercially successful technology may be attributed to cryptographers’ problematic relationship with the representational nature of models. It also discusses the trade-offs in the mathematization of cryptography.Less
This chapter examines the gradual crystallization of a cryptographic model for an electronic equivalent to handwritten signatures. It suggests that market demise of public-key infrastructures provided a powerful critique of the digital signature model and contends that the difficulties met in translating this model into a commercially successful technology may be attributed to cryptographers’ problematic relationship with the representational nature of models. It also discusses the trade-offs in the mathematization of cryptography.
Jean-Francois Blanchette
- Published in print:
- 2012
- Published Online:
- August 2013
- ISBN:
- 9780262017510
- eISBN:
- 9780262301565
- Item type:
- book
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262017510.001.0001
- Subject:
- Information Science, Information Science
The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at ...
More
The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. This book examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures. From the blackboards of mathematicians to the halls of legislative assemblies, the book traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography’s social projects. The book describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, the book argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.Less
The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. This book examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures. From the blackboards of mathematicians to the halls of legislative assemblies, the book traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography’s social projects. The book describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, the book argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.
Jean-François Blanchette
- Published in print:
- 2012
- Published Online:
- August 2013
- ISBN:
- 9780262017510
- eISBN:
- 9780262301565
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262017510.003.0005
- Subject:
- Information Science, Information Science
This chapter traces the path of a parallel definitional process, that of the legal model for electronic signatures. It explains that this model made its way through a series of political, regulatory ...
More
This chapter traces the path of a parallel definitional process, that of the legal model for electronic signatures. It explains that this model made its way through a series of political, regulatory and professional bodies in the later part of the 1990s and discusses the influence of a digital signatures on the discussion of what kind of evidence an electronically signed document might provide and how that evidence might be judged reliable. It also considers the debate between academic Lawrence Lessig and Judge Frank Easterbrook over law’s proper role in taming the unruliness of information technologies.Less
This chapter traces the path of a parallel definitional process, that of the legal model for electronic signatures. It explains that this model made its way through a series of political, regulatory and professional bodies in the later part of the 1990s and discusses the influence of a digital signatures on the discussion of what kind of evidence an electronically signed document might provide and how that evidence might be judged reliable. It also considers the debate between academic Lawrence Lessig and Judge Frank Easterbrook over law’s proper role in taming the unruliness of information technologies.
Jean-François Blanchette
- Published in print:
- 2012
- Published Online:
- August 2013
- ISBN:
- 9780262017510
- eISBN:
- 9780262301565
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262017510.003.0001
- Subject:
- Information Science, Information Science
This introductory chapter discusses the theme of this volume which is about the history of cryptographic culture and the place of evidence law in the age of electronic documents. This volume offers a ...
More
This introductory chapter discusses the theme of this volume which is about the history of cryptographic culture and the place of evidence law in the age of electronic documents. This volume offers a counterpoint to the preference for the analysis of the geometry of the line and describes the deployment of electronic signatures within the very professions entrusted with the production and management of documentary evidence. It also argues against the mathematization of cryptography and proposes a technical foundation for digital signatures based on the mathematics of public-key cryptography.Less
This introductory chapter discusses the theme of this volume which is about the history of cryptographic culture and the place of evidence law in the age of electronic documents. This volume offers a counterpoint to the preference for the analysis of the geometry of the line and describes the deployment of electronic signatures within the very professions entrusted with the production and management of documentary evidence. It also argues against the mathematization of cryptography and proposes a technical foundation for digital signatures based on the mathematics of public-key cryptography.
Andreas Bolfing
- Published in print:
- 2020
- Published Online:
- October 2020
- ISBN:
- 9780198862840
- eISBN:
- 9780191895463
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198862840.003.0003
- Subject:
- Mathematics, Computational Mathematics / Optimization, Logic / Computer Science / Mathematical Philosophy
This chapter provides a very detailed introduction to cryptography. It first explains the cryptographic basics and introduces the concept of public-key encryption which is based on one-way and ...
More
This chapter provides a very detailed introduction to cryptography. It first explains the cryptographic basics and introduces the concept of public-key encryption which is based on one-way and trapdoor functions, considering the three major public-key encryption families like integer factorization, discrete logarithm and elliptic curve schemes. This is followed by an introduction to hash functions which are applied to construct Merkle trees and digital signature schemes. As modern cryptoschemes are commonly based on elliptic curves, the chapter then introduces elliptic curve cryptography which is based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It considers the hardness of the ECDLP and the possible attacks against it, showing how to find suitable domain parameters to construct cryptographically strong elliptic curves. This is followed by the discussion of elliptic curve domain parameters which are recommended by current standards. Finally, it introduces the Elliptic Curve Digital Signature Algorithm (ECDSA), the elliptic curve digital signature scheme.Less
This chapter provides a very detailed introduction to cryptography. It first explains the cryptographic basics and introduces the concept of public-key encryption which is based on one-way and trapdoor functions, considering the three major public-key encryption families like integer factorization, discrete logarithm and elliptic curve schemes. This is followed by an introduction to hash functions which are applied to construct Merkle trees and digital signature schemes. As modern cryptoschemes are commonly based on elliptic curves, the chapter then introduces elliptic curve cryptography which is based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It considers the hardness of the ECDLP and the possible attacks against it, showing how to find suitable domain parameters to construct cryptographically strong elliptic curves. This is followed by the discussion of elliptic curve domain parameters which are recommended by current standards. Finally, it introduces the Elliptic Curve Digital Signature Algorithm (ECDSA), the elliptic curve digital signature scheme.
Andreas Bolfing
- Published in print:
- 2020
- Published Online:
- October 2020
- ISBN:
- 9780198862840
- eISBN:
- 9780191895463
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198862840.003.0007
- Subject:
- Mathematics, Computational Mathematics / Optimization, Logic / Computer Science / Mathematical Philosophy
Bitcoin was proposed by Nakamoto (2008) as the first electronic payment system, which fully relies on cryptographic primitives in order to work over a purely peer-to-peer system, where everyone can ...
More
Bitcoin was proposed by Nakamoto (2008) as the first electronic payment system, which fully relies on cryptographic primitives in order to work over a purely peer-to-peer system, where everyone can participate in spending funds to other users without the need for a trusted third party. This chapter first introduces the basic ideas of Satoshi Nakamoto, who defined an electronic coin as a chain of digital signatures. It explains how the addresses in Bitcoin are derived, and how the elliptic curve cryptography (ECC) key pair is used in order to transact funds from one user to another. For this, it shows how the transactions are constructed in Bitcoin, based on the most common transaction, which is the Pay-to-Public-Key-Hash transaction. The last section then shows how the transactions are permanently stored in the public ledger, the blockchain, and how the miners solve the Proof-of-Work in order to safeguard the records.Less
Bitcoin was proposed by Nakamoto (2008) as the first electronic payment system, which fully relies on cryptographic primitives in order to work over a purely peer-to-peer system, where everyone can participate in spending funds to other users without the need for a trusted third party. This chapter first introduces the basic ideas of Satoshi Nakamoto, who defined an electronic coin as a chain of digital signatures. It explains how the addresses in Bitcoin are derived, and how the elliptic curve cryptography (ECC) key pair is used in order to transact funds from one user to another. For this, it shows how the transactions are constructed in Bitcoin, based on the most common transaction, which is the Pay-to-Public-Key-Hash transaction. The last section then shows how the transactions are permanently stored in the public ledger, the blockchain, and how the miners solve the Proof-of-Work in order to safeguard the records.