2014
DOI: 10.1016/j.clsr.2014.01.002
|View full text |Cite
|
Sign up to set email alerts
|

The legal classification of identity-based signatures

Abstract: Identity-based cryptography has attracted attention in the cryptographic research community in recent years. Despite the importance of cryptographic schemes for applications in business and law, the legal implications of identity-based cryptography have not yet been discussed. We investigate how identity-based signatures fit into the legal framework. We focus on the European Signature Directive, but also take the UNCITRAL Model Law on Electronic Signatures into account. In contrast to previous assumptions, ide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…Compared with traditional public key cryptosystems using public key infrastructure (PKI), identity‐based cryptosystem simplifies the key management problem by avoiding public key certificates and attracts great attentions. Since then, a large number of literatures have been published in this area, including identity‐based encryption schemes , identity‐based signature schemes and identity‐based signcryption schemes .…”
Section: Introductionmentioning
confidence: 99%
“…Compared with traditional public key cryptosystems using public key infrastructure (PKI), identity‐based cryptosystem simplifies the key management problem by avoiding public key certificates and attracts great attentions. Since then, a large number of literatures have been published in this area, including identity‐based encryption schemes , identity‐based signature schemes and identity‐based signcryption schemes .…”
Section: Introductionmentioning
confidence: 99%