Abstract
There are important details that give legal validity to handwritten signatures: First, the document to be signed is under control of the signatory and it is not possible to substitute or alter it, and second, the tools to produce the signature (the pen and the signatory itself) are also under control of the signatory. These details make possible that handwritten signatures are used in a law court to prove the willingness of the signatory to be bound by the content of the document. Digital signatures require complex calculations that can not be done using mental arithmetic by the signatory. In this case neither document nor tools are under direct control of the signatory but under control of a computer. Consequently, the willingness of the signatory can not be sufficiently demonstrated. Furthermore, to be able to perform digital signatures, we must assume that the user trusts the computer to perform exactly what is intended. This yields digital signatures unusable in scenarios that require mobility. In this paper we present a system to perform digital signatures in environments that require mobility. The system is based on the use of personal digital assistants and smart cards and fulfils the common requirements established in different national laws regarding digital signatures.
Work partially supported by the E.U. through project IST 2001-32446
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gobierno de España. Real Decreto-Ley 14/1999, de 17 de septiembre, sobre firma electrónica. http://www.sgc.mfom.es/legisla/internet/rdley14_99.htm
Freudenthal, M.; Heiberg, S., Willemson, J.: Personal Security Environment on Palm PDA. Pertenecientea: Ann ual Computer Security Applications Conference, Sheraton New Orleans, Louisiana USA.
Daswani, N., Boneh, D.: Exp erimenting with Electronic Commerce on the PalmPilot. http://www.stanford.edu/~dabo
Ang, K. M., Caelli, W. J.: Certificate based PKI and B2B e-commerce: suitable match or not?. Proceedings of the 16th International Conference on Information Security (IFIP/SEC 2001). Kluwer Academic Publishers. (2001)
Rivest, R. L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21(2):120–126. (1978)
Davida, G. I., Desmedt, Y., Blaze, M. J.: Defending Systems Against Viruses Through Cryptographic Authentication. Proceedings of IEEE 1989 Symposium on Security and Privacy, pp 312–318. (1989)
Spalka, A., Cremers. A.B., Langweg, H.: Protecting the creation of digital signatures with trusted computing platform technology against attacks by Trojan Horse programs. Proceedings of the 16th International Conference on Information Security (IFIP/SEC 2001). Kluwer Academic Publishers. (2001)
Helme, A., Mullender, S.J.: What you see is what gets signed. Personal Communication.
IrDa Association. IrDa Standards. http://www.irda.org/standards/standards.asp
Bluetooth SIG Inc. The Bluetooth Specificdation. http://www.bluetooth.com/developer/speci.cation/speci.cation.asp
Maña, A., Martinez, J., Matamoros, S., Troya, J.M.: GSM-Tic ket: Generic Secure Mobile Ticketing Service. Proceedings of GDC 2001. (2001) http://www.lcc.uma.es/publicaciones/LCC803.pdf
Yee, B., Tygar, J.D.: Secure Coprocessors in Electronic Commerce Applications. Proceeding of the First USENIX Workshop on Electronic Commerce. (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maña, A., Matamoros, S. (2002). Practical Mobile Digital Signatures. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds) E-Commerce and Web Technologies. EC-Web 2002. Lecture Notes in Computer Science, vol 2455. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45705-4_24
Download citation
DOI: https://doi.org/10.1007/3-540-45705-4_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44137-3
Online ISBN: 978-3-540-45705-3
eBook Packages: Springer Book Archive