Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework
We present an approach different from the classical framework of qualified electronic signatures that seem to offer much better properties regarding usability, costs, risk level as well as security in technical sense. Our approach is based on mediated signatures and chaining mechanisms that replace time stamping services.
Keywordselectronic signature qualified signature mediator scheme chaining Merkle tree undeniability
Unable to display preview. Download preview PDF.
- 1.European Parliament and of the European Council: Directive 1999/93/ec of the european parliament and of the council of 13 december, on a community framework for electronic signatures. Official Journal of the European Communities L(13) (19/1/2000) (1999)Google Scholar
- 2.European Parliament and of the Council of Europe: Directive 2006/123/ec of the european parliament and of the council of 12 december, on services in the internal market. Official Journal of the European Communities L(376) (27/12/2006) (2006)Google Scholar
- 4.Council of Ministers of Poland: Regulation on determining the technical conditions of organization for qualified certification service providers, certification policies for qualified certificates issued by these entities and the technical conditions for secure devices for the submission and verification of electronic signatures. Dziennik Ustaw 128(1094) (7/07/2002)Google Scholar
- 5.Polish Parliament: Electronic signature act. Dziennik Ustaw 130(1450) (18/09/2001)Google Scholar
- 6.Young, A., Yung, M.: Cryptovirology: Extortion-based security threats and countermeasures. In: IEEE Symposium on Security and Privacy, pp. 129–140. IEEE Comp. Soc., Los Alamitos (1996)Google Scholar
- 7.Kucner, D., Kutyłowski, M.: Stochastic kleptography detection. In: Alster, K., Urbanowicz, J., Williams, H.C. (eds.) Public-key cryptography and computational number theory (Warsaw 2000), pp. 137–149. Walter de Gruyter Inc. (2001)Google Scholar
- 8.Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: Instantenous revocation of security capabilities. In: USENIX Security Symposium (2001)Google Scholar