Abstract
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Internet become legally valid without the implementation of signature procedures on secure computers with trustworthy user input and output? Can systems which lack secure user input and output be manipulated in such a way that financial damage arises? How should the liability for signatures made with systems without secure user input and output be assigned? This contribution provides arguments in support of the necessity for computers with secure user input and output as prerequisites for the achievement of bindingness. It is discussed that an economic way to achieve this is the development of portable devices. It is also discussed how the distribution of such devices can take place.
Preview
Unable to display preview. Download preview PDF.
References
American Bar Association: Digital Signature Guidelines. Chicago (1996)
Anderson, R.: Why Cryptosystems Fail. Paper presented at 1st Conference on Computer & Communication Security 1993 (ACM)
APSON-Group (Advanced Payment Systems for Open Networks): White Paper. (1995)
Asokan, N., Schunter, M., Waidner, M.: Optimistic Protocols for Fair Exchange. 4th ACM Conference on Computer and Communications Security. Zurich (1997)
Baert, Ch., Hecht, Th., Kuron, R., Lacoste, G., Livas, D., Petersen, Ch., Schunter, M., Weber, A., Wildhaber, B., Whinnett, D.: Survey Findings, Trial Requirements, and Legal Framework. (1996) Available at http://www.semper.org/
Chaum, D.: Card-Computer Moderated Systems. International Application Published under the Patent Cooperation Treaty (Classification H04K 1/00 No. WO 89/11762 of 30. November 1989)
Dalton, C.I., Griffin, J.F: Applying Military Grade Security to the Internet. Joint European Networking Conference, Edinburgh (1997)
Diffie, W.: Interview on the Development of Public Key Cryptography (1992) Available at http://www.iig.uni-freiburg.de/~aweber/
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory (1976) 644–654
Donnerhacke, L.: http://www.iks-jena.de/mitarb/lutz/security/
Europay France: http://www.europayfrance.fr/us/f-outils.htm of 10.3.1998
Ford, W.: Computer Communications Security. Principles, Standard Protocols and Techniques. Englewood Cliffs (1994)
Ford, W., Baum, M.: Secure Electronic Commerce. Upper Saddle River (1997)
Furger, F.; Paul, G.; Weber, A.: CAFE Survey Results. Institut für Sozialforschung, Frankfurt (1998) Available at: http://www.iig.uni-freiburg.de/~aweber/
Ihmor, H.: Architekturen von Signatur-IT. KES 4 (1997) 29–34
Kabay, M.: Infosec: The Year in Review. (1998) Available at http://www.ncsa.com
National Institute of Standards and Technology. Security Requirements for Cryptographic Modules (1994) Available at http://csrc.nist.gov/fips/fips1401.htm
Network Associates: http://www.nai.com/vinfo/
Neumann, P.: Computer Related Risks. Reading et al. (1995)
Overill, R.E.: Computer crime — an historical survey. Defence Systems International (1998). Available at http://www.kcl.ac.uk/orgs/icsa/crime.htm
özalp, N.: Entwurf von Benutzerendgeräten für elektronische Zahlungssysteme. (1996) Fachhochschule Hildesheim/Holzminden
Pfitzmann, A.; Pfitzmann, B.; Schunter, M.; Waidner, M.: Trusting Mobile User Devices and Security Modules. IEEE Computer (1997) 61–68
Ro\nagel, A., et al.: Die Simulationsstudie Rechtspflege. Eine neue Methode zur Technikgestaltung für Telekooperation. Berlin (1994)
Schunter, M.; Waidner, M.: Architecture and Design of a Secure Electronic Marketplace. Joint European Networking Conference, Edinburgh (1997). Available at http://www.semper.org
Thomspon, K.: Reflections on Trusting Trust; Communications of the ACM 27/8 (1984) 761–763
Verisign, Certification Practice Statement (1996). Available at http://www.verisign.com
Weber, A.: Soziale Alternativen in Zahlungsnetzen. Frankfurt, New York (1997)
Whybrow, M.: ATM Security. Ghosts in the machine. Banking Technology (April 1991) 39–43
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Weber, A. (1998). See what you sign secure implementations of digital signatures. In: Trigila, S., Mullery, A., Campolargo, M., Vanderstraeten, H., Mampaey, M. (eds) Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services. IS&N 1998. Lecture Notes in Computer Science, vol 1430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0056995
Download citation
DOI: https://doi.org/10.1007/BFb0056995
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64598-6
Online ISBN: 978-3-540-69343-7
eBook Packages: Springer Book Archive