{"file_date_updated":"2018-03-15T14:03:20Z","volume":30,"file":[{"creator":"florida","relation":"main_file","date_created":"2018-03-15T14:03:20Z","access_level":"closed","file_name":"479-Sorge-Legal-Classification2013.pdf","content_type":"application/pdf","date_updated":"2018-03-15T14:03:20Z","file_id":"1323","success":1,"file_size":194634}],"ddc":["040"],"publisher":"Elsevier","page":"126-136","author":[{"full_name":"Sorge, Christoph","first_name":"Christoph","last_name":"Sorge"}],"status":"public","title":"The Legal Classification of Identity-Based Signatures","user_id":"477","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"issue":"2","has_accepted_license":"1","doi":"10.1016/j.clsr.2014.01.002","_id":"479","year":"2014","citation":{"mla":"Sorge, Christoph. “The Legal Classification of Identity-Based Signatures.” Computer Law & Security Review, vol. 30, no. 2, Elsevier, 2014, pp. 126–36, doi:10.1016/j.clsr.2014.01.002.","chicago":"Sorge, Christoph. “The Legal Classification of Identity-Based Signatures.” Computer Law & Security Review 30, no. 2 (2014): 126–36. https://doi.org/10.1016/j.clsr.2014.01.002.","ieee":"C. Sorge, “The Legal Classification of Identity-Based Signatures,” Computer Law & Security Review, vol. 30, no. 2, pp. 126–136, 2014.","short":"C. Sorge, Computer Law & Security Review 30 (2014) 126–136.","ama":"Sorge C. The Legal Classification of Identity-Based Signatures. Computer Law & Security Review. 2014;30(2):126-136. doi:10.1016/j.clsr.2014.01.002","apa":"Sorge, C. (2014). The Legal Classification of Identity-Based Signatures. Computer Law & Security Review, 30(2), 126–136. https://doi.org/10.1016/j.clsr.2014.01.002","bibtex":"@article{Sorge_2014, title={The Legal Classification of Identity-Based Signatures}, volume={30}, DOI={10.1016/j.clsr.2014.01.002}, number={2}, journal={Computer Law & Security Review}, publisher={Elsevier}, author={Sorge, Christoph}, year={2014}, pages={126–136} }"},"abstract":[{"lang":"eng","text":"Identity-based cryptography has attracted attention in the cryptographic research community in recent years. Despite the importance of cryptographic schemes for applications in business and law, the legal implications of identity-based cryptography have not yet been discussed. We investigate how identity-based signatures fit into the legal framework. We focus on the European Signature Directive, but also take the UNCITRAL Model Law on Electronic Signatures into account. In contrast to previous assumptions, identity-based signature schemes can, in principle, be used even for qualified electronic signatures, which can replace handwritten signatures in the member states of the European Union. We derive requirements to be taken into account in the development of future identity-based signature schemes."}],"date_created":"2017-10-17T12:42:25Z","publication":"Computer Law & Security Review","intvolume":" 30","date_updated":"2022-01-06T07:01:22Z","type":"journal_article"}