Social signature: Signing by tweeting

18Citations
Citations of this article
208Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In many application contexts, qualified electronic signature appears difficult to be adopted both for the cost of smart cards and qualified certificates and for the complexity of the signing, verification, registration and certificate management.However, the European legislation allows us to use electronic signatures when application scope of the signature is limited. As a consequence, designing new signature protocols that relax the heaviest features of qualified electronic signature in favor of usability and cheapness is a timely and important issue. In this paper, we propose a new lightweight e-signature protocol with a good level of security, not using public key cryptography and dedicated devices. The protocol is conceived for closed domains of users, such as the case of document exchanges between citizens and municipal public offices or private companies and employees. According to the protocol, signature functions are spread out over the popular social network Twitter, without requiring changes of its features, so that the adoption of our solution appears both realistic and effective. © 2014 Springer International Publishing.

Cite

CITATION STYLE

APA

Buccafurri, F., Fotia, L., & Lax, G. (2014). Social signature: Signing by tweeting. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8650 LNCS, pp. 1–14). Springer Verlag. https://doi.org/10.1007/978-3-319-10178-1_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free