scholarly journals LEGISLATING MARKET WINNERS: DIGITAL SIGNATURE LAWS AND THE ELECTRONIC COMMERCE MARKETPLACE

2017 ◽  
Author(s):  
C. Bradford Biddle

The argument goes something like this: Internet commerce is hampered by the authentication problem. There is no reliable way to ensure that the sender of an electronic transmission is in fact who they purport to be. Digital signatures, supported by a “public key infrastructure” of certification authorities (CAs) and certificate databases, can solve this authentication problem. CAs will not emerge under the current legal regime, however, because they face uncertain and potentially immense liability exposure. Additionally, the legal status of digitally signed documents is unclear. Therefore, legislation is needed which defines and limits CA liability and which establishes the legality of digitally signed documents. Such legislation will solve the authentication problem and result in robust Internet commerce.

2017 ◽  
Author(s):  
C. Bradford Biddle

On March 9, 1995, the Utah Digital Signature Act (the “Utah Act”) was signed into law.1 Complex and ambitious, the Utah Act is intended to promote the use of digital signatures on computer-based documents and to facilitate electronic commerce.2 The Utah Act implements an infrastructure in which computer users utilize “certification authorities,” online databases called repositories, and public-key encryption technology in order to “sign” electronic documents in a legally binding fashion. In addition to setting out a regulatory scheme designed to implement this infrastructure, the Utah Act provides certain digital signatures with legal status as valid signatures and addresses a variety of issues relating to the status of digitally-signed electronic documents in contract and evidence law.


2011 ◽  
Vol 204-210 ◽  
pp. 1062-1065 ◽  
Author(s):  
Yu Qiao Deng

Digital signature schemes allow a signer to transform any message into a signed message, such that anyone can verify the validity of the signed message using the signer’s public key, but only the signer can generate signed messages. A proxy re-signature, which is a type of digital signatures, has significant applications in many areas. Proxy signature scheme was first introduced by Blaze, Bleumer, and Strauss, but that scheme is inefficient and with limited features. After that, some Proxy re-signature schemes were proposed by researchers. This paper constructs a blind proxy re-signatures scheme. Comparing to the previous proxy re-signature schemes, the scheme adds a message blinded feature, and then the security of the scheme is proven.


2013 ◽  
Vol 748 ◽  
pp. 953-957
Author(s):  
Jing Song Tian ◽  
Xiao Qin Wu ◽  
Rong Hu

with the network intelligent development, the technique widely application brings huge convenient for peoples life and work. The network openness exist great hidden troubles along with the information security. Based on the security system of public key infrastructure, we can determine the users information security and completion through the method of providing secret keys and certificate managing by both sides. Through the research of public key infrastructure, we can design out the planning of electronic payment platform and apply it in the practical society. This is the most important point that network staff and electronic commerce works are searching.


2017 ◽  
Author(s):  
C. Bradford Biddle

Following the lead of the State of Utah, numerous states and several foreign countries have enacted “digitalsignature” legislation aimed at promoting the development of a public key infrastructure (PKI). While PKIlegislation has acquired significant momentum, it is not clear that lawmakers have carefully considered thepublic policy implications and long-term consequences of these laws. This article surveys ten public policyissues implicated by digital signature legislation.


Author(s):  
Manuel Mogollon

In public-key encryption, the secrecy of the public key is not required, but the authenticity of the public key is necessary to guarantee its integrity and to avoid spoofing and playback attacks. A user’s public key can be authenticated (signed) by a certificate authority that verifies that a public key belongs to a specific user. In this chapter, digital certificates, which are used to validate public keys, and certificate authorities are discussed. When public-key is used, it is necessary to have a comprehensive system that provides public key encryption and digital signature services to ensure confidentiality, access control, data integrity, authentication, and non-repudiation. That system, public-key infrastructure or PKI, is also discussed in this chapter.


2016 ◽  
Vol 2016 ◽  
pp. 1-18 ◽  
Author(s):  
Yang Shi ◽  
Jie Lin ◽  
Guoyue Xiong ◽  
Xiaoping Wang ◽  
Hongfei Fan

Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.


HAMUT AY ◽  
2018 ◽  
Vol 5 (2) ◽  
pp. 95
Author(s):  
Fresia Yanina Holguín García

El análisis descriptivo del funcionamiento de la arquitectura de frma digital con base en infraestructura de clave pública determinó el objetivo central de toda la investigación, por ello se expusieron las responsabilidades, que cada Autoridad de Certifcación ejerce en su proceso de creación y verifcación, para garantizar la autenticidad, integridad y no repudio de la información transmitida. La metodología utilizada es la documental a través de la revisión bibliográfca de los principales conceptos de frma digital, criptografía y PKI obtenida de repositorios, bibliotecas digitales, base de datos de libre acceso y Google Académico.A partir del estudio realizado se puede concluir que la frma digital con base en la infraestructura de clave pública es un proceso transparente que genera fabilidad tanto al emisor como al receptor de que las claves generadas corresponden a sus legítimos propietarios, pero es necesario que esté amparada por un marco legislativo adecuado, se emplee un hardware y software sofsticado.


2021 ◽  
pp. 104-111
Author(s):  
Alexander Matsegorin ◽  
Oleksandra Tsaryk

Problem setting. Due to the rapid impact of information and communication technologies on commodity-money relations, which are in the sphere of civil turnover in Ukraine, the number of contracts concluded in electronic form is significantly increasing. The scope of electronic documents both in contractual civil law relations and in general in the relations of individuals with government agencies, courts and other public law entities has a clear tendency to expand and grow. Thus, in many areas of commodity-money exchange, the interaction of executors and customers (clients) has reached a completely new organizational and legal level and is carried out exclusively online, because the territorial remoteness and implementation of quarantine measures against COVID-19 is not always possible to sign an agreement on paper. These statements determine the relevance of the chosen research topic. The object of the study is the civil legal relationship using a mobile digital signature (Mobile ID). The subject of the research is the advantages and disadvantages of electronic identification with the use of mobile digital signature in civil circulation. The state of research of the problem. Such scientists as M. I. Anokhin, Yu. V. Borodakiy, N. P. Varnovsky, V. M. Glushkov, M. V. Denisova, M. M. Dutov, A.V. Kobets, G.I. Kupriyanova, A. Matvienko, V. A. Onegov, I. A. Semaev, V. A. Shakhverdov, M. N. Tsyvin, V. V. Yashchenko and others. The target of research is to study the features of the legal regulation of electronic digital signature of a person and his legal status with the analysis of issues arising from the use of such a signature in civil turnover, the formulation of proposals for their solution. Article’s main body. The possibility of using mobile digital signatures in the document flow is provided by the relevant regulations. The Law of Ukraine “On Electronic Digital Signature” adopted on May 22, 2003, defines the legal status of an electronic digital signature and regulates the relations that arise when using an electronic digital signature. This Law does not apply to relations arising from the use of other types of electronic signatures, including digitized images of handwritten signatures. At the same time, the provision of Part 3 of Article 207 of the Civil Code of Ukraine on the use of facsimile reproduction of the signature by means of mechanical, electronic or other copying, as well as electronic signature or other analogue of handwritten signature with the written consent of the parties, which must contain samples handwritten signatures. The legislative base on electronic signatures is currently constantly growing, a passport of a citizen of Ukraine in the form of a card with a contactless electronic carrier (and an electronic digital signature) has been introduced into the continuum of indirect electronic reality. The Law of Ukraine "On Electronic Commerce" of September 3, 2015 regulates the legal regulation of the field of electronic commerce in Ukraine, defines the procedure for electronic transactions with the use of information and telecommunications systems. The legal basis for the provision of electronic trust services, including cross-border, the rights and obligations of the subjects of legal relations in the field of electronic trust services are subject to the Law of Ukraine "On electronic trust services" of October 5, 2017. The number of diverse legal material causes some difficulties in the practical application of a mobile digital signature. Differences in national terminology, which are contained in different sources, as well as existing legal gaps determine the relevance of this problem and require appropriate research. Conclusions and prospects for the development. The scientific novelty of the study is a comprehensive consideration of this topic, namely: the pros and cons of using a mobile digital signature, making suggestions for improving existing legislation with concepts and functions related to the use (Mobile ID).


2021 ◽  
Author(s):  
N.I. Solovyanenko

The article is devoted to the legal problems of using documents signed with electronic signatures in electronic commerce. The article considers the different legal regime of electronic documents depending on the type of electronic signature. Legal features of a qualified electronic signature are analyzed. The legal status of a certification service provider and its legal functions in e-commerce are examined. The conclusion is made about the recognition of electronic documents as a priority method of legal interaction in the field of electronic commerce and the complication of the legal construction of an electronic signature.


Sign in / Sign up

Export Citation Format

Share Document