Abstract
The conflict between accepted modern cryptographic approaches to digital signatures and the venerable traditions of the law of signatures and the law of contracts has been well expounded over the last few years. During this year, hardware progress in public-key encryption has made it possible largely to bridge the gap between these two realms. This paper shows one way to do so. This is a promising time for cryptographic work on digital signatures, as well as for joint legal/cryptographic consideration of outstanding signature issues.
Similar content being viewed by others
References
Blakley B, Blakley GR (1978) Security of public key cryptosystems against random attack. Part 1, Cryptologia 2(4):305–321, Part 2, Cryptologia 3(1):29–42, Part 3, Cryptologia 3(2):205–118
Blakley B, Blakley GR (2000) All sail, no anchor, I: Cryptography, Risk, and e-Commerce. In: Dawson E, Clark A, Boyd C (eds) Information security and privacy, Proceedings, ACISP 2000. Lecture notes in computer science, vol 1841. Springer, Berlin Heidelberg New York, pp 471–476
Brickell EF (1990) A survey of hardware implementations of RSA In: Brassard G (ed) Advances in cryptology: Crypto 89. Lecture notes in computer science, vol 435. Springer, Berlin Heidelberg New York, pp 368–370
Davida GI (1982) Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem. Technical Report TR-CS-82-2, Department of Electrical Engineering and Computer Science, University of Wiusconsin, Milwaukee, WI
Davies DW, Price, WL (1980) The application of digital signatures based on public-key cryptosystems. Proceedings of the 5th International Computer Communications Conference, October 1980, pp 530–535
Denning DER (1983) Cryptography and data security. Addison-Wesley, Reading, MA
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Transactions on Information Theory IT-22, pp 644–654
Hart PE, Liu Z (2003) Trust in the preservation of digital information. Communications of the ACM 44(6):93–97
McCullagh AJ (2001) The incorporation of trust strategies in digital signature regimes. PhD thesis, ISRC, Queensland University of Technology, Australia
Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21:120–126
Rivest RL (1991) The MD4 message digest algorithm. In: Menezes AJ, Vanstone SA (eds) Advances in cryptology: Crypto 90. Lecture notes in computer science, vol 537. Springer, Berlin Heidelberg New York, pp 303–311
Shamir A, Tromer E (2003) Factoring large numbers with the TWIRL device. In: Boneh D (ed) Advances in cryptology: Crypto 03. Lecture notes in computer science, vol 2729. Springer, Berlin Heidelberg New York, pp 1–26
Stinson DR (2002) Cryptography: Theory and practice, 2nd ed. Chapman & Hall/CRC, Boca Raton, Florida
Wildstrom SH (2003) Technology & you, just click on the dotted line. Business Week, 2 June 2003, p 18
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Blakley, B., Blakley, G. All sail, no anchor II: Acceptable high-end PKI. IJIS 2, 66–77 (2004). https://doi.org/10.1007/s10207-003-0029-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-003-0029-1