Digital signature is the key issue in a number of innovative pro- cesses, such as dematerialization, e-government, e-commerce, and e-banking. Digital signature ensures both the identity of the user and the integrity of the digital docu- ment the user signs. However, despite the robustness of the underlying cryptographic primitives, a number of vulnerabilities derive from the radical difference between handwritten signature on papers and signature on digital documents. Indeed, digital documents are not directly observable because humans need a tool to interpret the bits of the document and to represent the corresponding information. The aim of this paper is to focus on the vulnerabilities of digital signature deriving from the “unobservability” of electronic documents. Possible mechanisms to contrast such vulnerabilities are also proposed, highlighting their positive and negative points under a perspective that does not ignore both practical and regulatory aspects.
Digital Document Signing: Vulnerabilities and Solutions / Lax, G; Buccafurri, F; Caminiti, G. - In: INFORMATION SECURITY JOURNAL. - ISSN 1939-3555. - 24:1--3(2015), pp. 1-14. [10.1080/19393555.2014.998843]
Digital Document Signing: Vulnerabilities and Solutions
LAX G
;BUCCAFURRI F;
2015-01-01
Abstract
Digital signature is the key issue in a number of innovative pro- cesses, such as dematerialization, e-government, e-commerce, and e-banking. Digital signature ensures both the identity of the user and the integrity of the digital docu- ment the user signs. However, despite the robustness of the underlying cryptographic primitives, a number of vulnerabilities derive from the radical difference between handwritten signature on papers and signature on digital documents. Indeed, digital documents are not directly observable because humans need a tool to interpret the bits of the document and to represent the corresponding information. The aim of this paper is to focus on the vulnerabilities of digital signature deriving from the “unobservability” of electronic documents. Possible mechanisms to contrast such vulnerabilities are also proposed, highlighting their positive and negative points under a perspective that does not ignore both practical and regulatory aspects.File | Dimensione | Formato | |
---|---|---|---|
published.pdf
non disponibili
Tipologia:
Versione Editoriale (PDF)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
2.31 MB
Formato
Adobe PDF
|
2.31 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.