Jean-François Blanchette
- Published in print:
- 2012
- Published Online:
- August 2013
- ISBN:
- 9780262017510
- eISBN:
- 9780262301565
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262017510.003.0005
- Subject:
- Information Science, Information Science
This chapter traces the path of a parallel definitional process, that of the legal model for electronic signatures. It explains that this model made its way through a series of political, regulatory ...
More
This chapter traces the path of a parallel definitional process, that of the legal model for electronic signatures. It explains that this model made its way through a series of political, regulatory and professional bodies in the later part of the 1990s and discusses the influence of a digital signatures on the discussion of what kind of evidence an electronically signed document might provide and how that evidence might be judged reliable. It also considers the debate between academic Lawrence Lessig and Judge Frank Easterbrook over law’s proper role in taming the unruliness of information technologies.Less
This chapter traces the path of a parallel definitional process, that of the legal model for electronic signatures. It explains that this model made its way through a series of political, regulatory and professional bodies in the later part of the 1990s and discusses the influence of a digital signatures on the discussion of what kind of evidence an electronically signed document might provide and how that evidence might be judged reliable. It also considers the debate between academic Lawrence Lessig and Judge Frank Easterbrook over law’s proper role in taming the unruliness of information technologies.
Jean-François Blanchette
- Published in print:
- 2012
- Published Online:
- August 2013
- ISBN:
- 9780262017510
- eISBN:
- 9780262301565
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262017510.003.0006
- Subject:
- Information Science, Information Science
This chapter examines the experiences of three bureaucratic organizations as they struggle with the application of electronic signatures to real estate contracts, birth certificates, and land titles. ...
More
This chapter examines the experiences of three bureaucratic organizations as they struggle with the application of electronic signatures to real estate contracts, birth certificates, and land titles. It suggests that the divergent routes in the computerization of these documents highlight the need to pay attention to the specific material conditions and institutional contexts that govern the production of written evidence. It also argues that the technical conditions necessary for the long-term legibility of electronic documents present a serious challenge to the forensic value of cryptographic signature verification.Less
This chapter examines the experiences of three bureaucratic organizations as they struggle with the application of electronic signatures to real estate contracts, birth certificates, and land titles. It suggests that the divergent routes in the computerization of these documents highlight the need to pay attention to the specific material conditions and institutional contexts that govern the production of written evidence. It also argues that the technical conditions necessary for the long-term legibility of electronic documents present a serious challenge to the forensic value of cryptographic signature verification.
Keith M. Martin
- Published in print:
- 2017
- Published Online:
- July 2017
- ISBN:
- 9780198788003
- eISBN:
- 9780191829956
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198788003.003.0007
- Subject:
- Mathematics, Computational Mathematics / Optimization, Logic / Computer Science / Mathematical Philosophy
In this chapter, we discuss digital signature schemes. We start by considering the general requirements of a digital signature scheme. We show first that a digital signature scheme could be ...
More
In this chapter, we discuss digital signature schemes. We start by considering the general requirements of a digital signature scheme. We show first that a digital signature scheme could be established using symmetric techniques. We then consider the more conventional use of public-key cryptography to create digital signature schemes. We compare two different approaches to building a digital signature scheme and illustrate how to manifest these using RSA. We then discuss practical issues concerning digital signature schemes, including different aspects of their security. We close by providing a detailed comparison between digital signatures and handwritten signatures which serves to both illustrate the strengths and vulnerabilities of digital signature schemes.Less
In this chapter, we discuss digital signature schemes. We start by considering the general requirements of a digital signature scheme. We show first that a digital signature scheme could be established using symmetric techniques. We then consider the more conventional use of public-key cryptography to create digital signature schemes. We compare two different approaches to building a digital signature scheme and illustrate how to manifest these using RSA. We then discuss practical issues concerning digital signature schemes, including different aspects of their security. We close by providing a detailed comparison between digital signatures and handwritten signatures which serves to both illustrate the strengths and vulnerabilities of digital signature schemes.