Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Canadian Journal of Law and Technology

2015

Cryptography

Articles 1 - 1 of 1

Full-Text Articles in Law

Signing Your Next Deal With Your Twitter @Username: The Legal Uses Of Identity-Based Cryptography, Jillian Friedman Jan 2015

Signing Your Next Deal With Your Twitter @Username: The Legal Uses Of Identity-Based Cryptography, Jillian Friedman

Canadian Journal of Law and Technology

This article will look at the legal framework for electronic signatures under Canadian law and through the UNCITRAL Model Law on Electronic Signatures and evaluate the potential use of identity-based cryptography as a type of electronic signature. While most jurisdictions permit electronic signatures to replace their handwritten predecessors, the criteria of validity for an electronic signature range from liberal to restrictive. Public key infrastructure (PKI) cryptography schemes are considered to meet the juridical conditions of a legal signature under more rigorous legislation that requires an electronic signature to possess certain security attributes. In common law jurisdictions, digital signature schemes such …