Skip to main content

See what you sign secure implementations of digital signatures

  • Conference paper
  • First Online:
Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services (IS&N 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1430))

Included in the following conference series:

Abstract

An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Internet become legally valid without the implementation of signature procedures on secure computers with trustworthy user input and output? Can systems which lack secure user input and output be manipulated in such a way that financial damage arises? How should the liability for signatures made with systems without secure user input and output be assigned? This contribution provides arguments in support of the necessity for computers with secure user input and output as prerequisites for the achievement of bindingness. It is discussed that an economic way to achieve this is the development of portable devices. It is also discussed how the distribution of such devices can take place.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. American Bar Association: Digital Signature Guidelines. Chicago (1996)

    Google Scholar 

  2. Anderson, R.: Why Cryptosystems Fail. Paper presented at 1st Conference on Computer & Communication Security 1993 (ACM)

    Google Scholar 

  3. APSON-Group (Advanced Payment Systems for Open Networks): White Paper. (1995)

    Google Scholar 

  4. Asokan, N., Schunter, M., Waidner, M.: Optimistic Protocols for Fair Exchange. 4th ACM Conference on Computer and Communications Security. Zurich (1997)

    Google Scholar 

  5. Baert, Ch., Hecht, Th., Kuron, R., Lacoste, G., Livas, D., Petersen, Ch., Schunter, M., Weber, A., Wildhaber, B., Whinnett, D.: Survey Findings, Trial Requirements, and Legal Framework. (1996) Available at http://www.semper.org/

    Google Scholar 

  6. Chaum, D.: Card-Computer Moderated Systems. International Application Published under the Patent Cooperation Treaty (Classification H04K 1/00 No. WO 89/11762 of 30. November 1989)

    Google Scholar 

  7. Dalton, C.I., Griffin, J.F: Applying Military Grade Security to the Internet. Joint European Networking Conference, Edinburgh (1997)

    Google Scholar 

  8. Diffie, W.: Interview on the Development of Public Key Cryptography (1992) Available at http://www.iig.uni-freiburg.de/~aweber/

    Google Scholar 

  9. Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory (1976) 644–654

    Google Scholar 

  10. Donnerhacke, L.: http://www.iks-jena.de/mitarb/lutz/security/

    Google Scholar 

  11. Europay France: http://www.europayfrance.fr/us/f-outils.htm of 10.3.1998

    Google Scholar 

  12. Ford, W.: Computer Communications Security. Principles, Standard Protocols and Techniques. Englewood Cliffs (1994)

    Google Scholar 

  13. Ford, W., Baum, M.: Secure Electronic Commerce. Upper Saddle River (1997)

    Google Scholar 

  14. Furger, F.; Paul, G.; Weber, A.: CAFE Survey Results. Institut für Sozialforschung, Frankfurt (1998) Available at: http://www.iig.uni-freiburg.de/~aweber/

    Google Scholar 

  15. Ihmor, H.: Architekturen von Signatur-IT. KES 4 (1997) 29–34

    Google Scholar 

  16. Kabay, M.: Infosec: The Year in Review. (1998) Available at http://www.ncsa.com

    Google Scholar 

  17. National Institute of Standards and Technology. Security Requirements for Cryptographic Modules (1994) Available at http://csrc.nist.gov/fips/fips1401.htm

    Google Scholar 

  18. Network Associates: http://www.nai.com/vinfo/

    Google Scholar 

  19. Neumann, P.: Computer Related Risks. Reading et al. (1995)

    Google Scholar 

  20. Overill, R.E.: Computer crime — an historical survey. Defence Systems International (1998). Available at http://www.kcl.ac.uk/orgs/icsa/crime.htm

    Google Scholar 

  21. özalp, N.: Entwurf von Benutzerendgeräten für elektronische Zahlungssysteme. (1996) Fachhochschule Hildesheim/Holzminden

    Google Scholar 

  22. Pfitzmann, A.; Pfitzmann, B.; Schunter, M.; Waidner, M.: Trusting Mobile User Devices and Security Modules. IEEE Computer (1997) 61–68

    Google Scholar 

  23. Ro\nagel, A., et al.: Die Simulationsstudie Rechtspflege. Eine neue Methode zur Technikgestaltung für Telekooperation. Berlin (1994)

    Google Scholar 

  24. Schunter, M.; Waidner, M.: Architecture and Design of a Secure Electronic Marketplace. Joint European Networking Conference, Edinburgh (1997). Available at http://www.semper.org

    Google Scholar 

  25. Thomspon, K.: Reflections on Trusting Trust; Communications of the ACM 27/8 (1984) 761–763

    Google Scholar 

  26. Verisign, Certification Practice Statement (1996). Available at http://www.verisign.com

    Google Scholar 

  27. Weber, A.: Soziale Alternativen in Zahlungsnetzen. Frankfurt, New York (1997)

    Google Scholar 

  28. Whybrow, M.: ATM Security. Ghosts in the machine. Banking Technology (April 1991) 39–43

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Sebastiano Trigila Al Mullery Mario Campolargo Hans Vanderstraeten Marcel Mampaey

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weber, A. (1998). See what you sign secure implementations of digital signatures. In: Trigila, S., Mullery, A., Campolargo, M., Vanderstraeten, H., Mampaey, M. (eds) Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services. IS&N 1998. Lecture Notes in Computer Science, vol 1430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0056995

Download citation

  • DOI: https://doi.org/10.1007/BFb0056995

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64598-6

  • Online ISBN: 978-3-540-69343-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics