Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2020, International Journal of Engineering Research and
Digital Signatures based on asymmetric crypto systems have been recognized as legally acceptable form of signing under the Information Technology Act, 2000. An electronic document signed using digital signature has the same acceptance as a handwritten signature. Cryptographic tokens are a widely used method for issuing Digital Signatures. However, issuance of a token requires various modes of verification based on identity and address proofs and the scheme is not scalable to billion people. For mass adoption of Digital Signature Certificate (DSC), a simple online service is desirable that allows one to have the ability to sign a document with ease. With that in consideration, an online scheme that uses the Electronic Know Your Customer (e-KYC) mechanisms from Aadhaar and provides the trust on documents in the form of digital signatures, eSign, is enabled by the Government of India since 2015. Various benefits that eSign provides include convenience and ease of operations to the signer, streamlined processes and reduction in the costs of operations largely associated with handling and storage of paper. Since the inception, eSign technology has been adopted by various sectors including e-Governance and Finance. Many more sectors are seen as potential use case for the technology.
International Journal of Engineering Research and Technology (IJERT), 2020
https://www.ijert.org/e-sign-an-online-digital-service-evolving-trends-use-cases https://www.ijert.org/research/e-sign-an-online-digital-service-evolving-trends-use-cases-IJERTV9IS010038.pdf Digital Signatures based on asymmetric crypto systems have been recognized as legally acceptable form of signing under the Information Technology Act, 2000. An electronic document signed using digital signature has the same acceptance as a handwritten signature. Cryptographic tokens are a widely used method for issuing Digital Signatures. However, issuance of a token requires various modes of verification based on identity and address proofs and the scheme is not scalable to billion people. For mass adoption of Digital Signature Certificate (DSC), a simple online service is desirable that allows one to have the ability to sign a document with ease. With that in consideration, an online scheme that uses the Electronic Know Your Customer (e-KYC) mechanisms from Aadhaar and provides the trust on documents in the form of digital signatures, eSign, is enabled by the Government of India since 2015. Various benefits that eSign provides include convenience and ease of operations to the signer, streamlined processes and reduction in the costs of operations largely associated with handling and storage of paper. Since the inception, eSign technology has been adopted by various sectors including e-Governance and Finance. Many more sectors are seen as potential use case for the technology.
IGI Global eBooks, 2011
The Information Technology Act 2000 (IT Act) dictates digital signatures as a means of authentication and security of electronic documents. Digital signature is an electronic token that creates binding between an entity and a data record. They serve the purpose of validation and authentication of electronic documents .Validation refers to the process of certifying the contents of the document, while authentication refers to the process of certifying the sender of the document. It can be said that a digital signature is an electronic version of a handwritten signature. The signing process is implemented with the help of public key cryptography; the signatory uses her private key to create a digital signature for a document. It is used to ensure that the original content of the message or document that has been sent is unchanged. Its varied nature has provided easy, faster, accurate and convenient mechanism for creating, storing, transmission and retrieval of data without involving traditional paper based formalities. This has increased the use of digital technology in day to day life which has led the world to go online that in turn has increased techno-dependency. Increasingly the business dealings, communication, official data and commercial transactions are being carried out in cyberspace. There has been transformation of world from paper based to digital based work. In the last few years, there has been a rapidly growing demand for a working digital signature framework for both public and public sector. The study revolves around the maximum information on digital signature, the future of Information Technology.
Journal of Contemporary Issues in Business and Government, 2021
Nowaday, the digital age is expanding with the strong development of 4.0 Industry. The transformations of the flat world force businesses to have solutions to handle their works quicker, safer, more efficient, convenient and with high security so that they can trade goods. Declare tax, contracting, etc. all data are digitized in order to be easily stored, retrieved and accessed. To resolve the mentioned problems, the research topic "Researches and applications of digital signatures in Nowaday E-commerce" will explain what digital signature is, the application of digital signature (tokens) in e-commerce, hence, provides methods and goals to users, creates premises for higher development in Information Technology.
The digital signature is been generated for the purpose of transmitting the actual data without any changes or alteration. The digital Signature Service may operate as Web Server Application on the clients or users system. The client can send document to the sever as well as receive back the same document or vice-versa. The DSS (Digital Signature Services) Core specifications grant the basic protocols and elements which are adapted to base the specific use cases in the DSS profiles. The study is been done in the of electronic commerce field (e-commerce "), and specifically for Digital Signature been used in the field of E-commerce. Some researchers have already started researching on digital signature is to ensure integrity of the message as it helps in verifying whether actual messages is been transmitted or not the integrity factor helps in verifying the accuracy of the message that is been exchanged between the two parties via unsecured modes like the Internet.
International Journal of Computer Applications, 2011
Different forms of encryption techniques are being used to ensure privacy of data transmitted over Internet. Digital signature which uses Public Key Encryption (PKE) ensures privacy of conversation, integrity of data, authenticity of sender and non-repudiation of sender. Several applications on desktops, mobiles and other devices use it to secure data of various applications, services and access to devices. Digital signature exists as a file on some storage device or is embedded in hardware devices. Digital signature certificates are digital signatures that are signed by some third party certifying authority. This paper describes working of digital signature through illustrations and explains various procedures and algorithms involved in signings the data through use of digital signature. It introduces an open source software tool that can be used to study processes, procedures and algorithms used in digital signatures. It also presents information about different types of digital signature certificates currently available, file formats used therein and programming support of digital signature in .NET languages. Further, it presents an excerpt of digital signature scenario in Indian Government.
2021
As Digital Signature Certificates are mandatory to use for filing tax, e-tendering, ROC etc. The Government of India has made mandatory as per the CCA guidelines. There are major number of Chartered Accountants who use Digital Signature Certificates over Contractors and Businessmen. As there are many players in the market who provides the service of the digital signature certificates, Aadhar based EKYC, Non EKYC and Cryptographic tokens there is a heavy competition in the market. The main key factors to acquire the new customers is to be find out to form the marketing strategies to attract the cus tome rs . As this is the Service sector it is important to know how much satisfied the customers with their service providers and it is also important to know those service factors. The purpose of the study is to assess the need for digital signatures. It will help understand the attitude of customers towards the company. The study will be conducted at Bangalore Urban where the company is ...
2004
The objective of the “Study on the supply-side of EU e-signature market” is to collect and analyse information on the e-signature market in the EU, with particular attention to the supply-side. The main objectives of study are the following: - To identify the main characteristics of the EU e-signature market actors; - To define the characteristics of products and services on the EU e-signature market; - To provide an overview of the e-signature demand-side; - To provide recommendations to different types of stakeholders, in order to have a clear picture of the e-signature market opportunities in Europe.
Lecture Notes in Computer Science, 1990
The recognition of electronic signature and electronic message creates many legal problems in its application in the different law systems (ex: Automatic
International Journal for Research in Applied Science and Engineering Technology IJRASET, 2020
Running towards the best technology and using technology for everything is now a trend. Usage of internet is the easiest and accessible technology we are having. The Information Technology Act 2000 (IT Act), Indian law dealing with cybercrime and electronic commerce, describes digital signatures as a means of authentication and security of electronic documents. Digital signature refers to an electronic receipt that creates link between an entity and data record, serving the purpose of verification and authentication of an electronic document. Verification of an electronic document means the process of certifying the contents of the document, while authentication means the process of certifying the sender of the document. Any handwritten signature when used in its electronic version referred as a digital signature. A valid digital signature creates believe that the message was created by a known sender, that the sender cannot deny that he sent the message and that the message was not changed in transit. This helped in increasing the use of digital technology in daily life which has increased technology dependency. Confidential messages, software distribution, cases where it is important to detect forgery or tampering are the fine examples where the digital signature has its use. It provides the services of verification, authentication and data integrity.
2013
People who do business on the Internet require security and trust. Inelectronic commerce and communication, you cannot be sure regarding the identityof the person with whom you are speaking. The legal framework regardingelectronic commerce has created in Albania the premises for a real revolution,regarding the way in which the business is organized. The problem is that thisrevolution has yet to come. The focus of this article will be the electronic signature,one of the most important innovations regarding the electronic commerce. Theelectronic signatures are electronic data, attained through specific informaticsprocedures that are used for security and trust in electronic business andcommunications.This article deals with the legal importance of signed documents and thedebate regarding the relevance of the electronic signature, with a specific focus onthe law and its practical application. The law recognizes three kinds of e-signatures:the simple electronic signature, the advanced e...
Cuvinte cheie : digital signatures, electronic commerce, secured devices to generate electronic signatures Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security) of exchanging personal and financial data is still a major concern amongst all kinds of users. We believe that only digital signature technologies based on publickey cryptography can guarantee the necessary security and consumer confidence. The exigency in the conclusion of a written legal document, ad validitatem or ad probationem, is satisfied by the electronic document with an incorporated electronic signature, based on the acknowledged certificate and generated with a signature creation device.
Gomal University journal of research, 2012
This paper focuses on the issues of eSignatures for secure eTransactions in Pakistan i.e. social and legal issues. Internet has become affordable in developing countries like Pakistan, yet the societal changes surrounding eSignatures are even greater threat than that of developed countries. The increasing use of internet for eBusiness has raised the issue of legality of eTransactions. The researchers have underlined several factors responsible for creating issues for eTransactions however the problems of eSignature are prominent. In Pakistan, eBusiness is an infant child facing several social and legal issues e.g. privacy and authentication, trust psychological and cultural, internet access and eSecurity. Given the absence of adequate legislation on eSignatures in Pakistan, this paper concludes that to meet the user's needs, legal infrastructure must first be put in place before users in Pakistan can actively engage in secure eBusiness transactions.
To address and facilitate the growth of activities in the area of e-and m-commerce, United Nations produced a document called the UNCITRAL Model Law. Article 13 of the Model Law describes the concept of 'attribution of data messages', a principal component in ensuring authenticity and reliability of an electronic message. The purpose behind such prescription is to ensure harmony among trading partners as the implementation of regulatory framework in many countries is not uniform and bound by various jurisdictional issues. While conducting transactions across borders, including state and national, trading parties should be aware of various consequences of 'transmission of electronic messages' as there may be profound implications to the parties when things go wrong due to technical problems.
IRJET, 2021
Recent development in E-Governance would like to leverage digital signature capabilities, which is usage of Information and Communication Technology by the government to provide and facilitate government services, exchange of information etc. Digital signature is a wellknown mechanism to carry out digital authentication and verification of electronic transactions in the online world. As it comes with the word online, the biggest concern is the security issue. To provide E-authentication to the user there are many cryptographic techniques available. This paper discusses increasing the security, reliability, and nonrepudiation of the user's data or information using Digital signature. It is a highly secured and well-known method to authenticate and verify an electronic transaction.
Common Law World Review, 2016
There are several laws and some notable judicial decisions across the globe to regulate electronic signatures. These judicial decisions when interpreting legislation are not consistent with each other. They leave much to be desired. There are still problems with the validity of an electronic signature. In this paper the author mainly focuses on the South African model. The major legislation regulating the use of electronic signatures in South Africa is the Electronic Communications and Transactions Act 25 of 2002. It has recently been interpreted in the case of Spring Forest Trading v Wilberry by the High Court of KwaZulu-Natal (KZN) and the highest court of South Africa, the Supreme Court of Appeal (SCA). However, there is a wide difference in the approaches of the High Court of KZN and the SCA. Even in other jurisdictions judicial decisions have not helped towards clarifying the law; rather one has to wade through conflicting approaches of judges to understand where the law is goi...
SHS Web of Conferences
The purpose of Directive 1999/93 / EC on the Community framework for electronic signatures is to facilitate the use of electronic signatures. Digital signatures are incredibly important as they prevent fraud in e-commerce transactions. A legal framework for electronic signatures is established to ensure the smooth functioning of the internal market. This article aims to interpret the European framework for digital signatures. Member States shall at least ensure that, when issuing a certificate, the certification body is liable for any damage caused to any entity or natural or legal person reasonably based on the certificate: (a) the accuracy, at the time of issue, of all the information contained in the recognized certificate. (b) ensure that, at the time of issue of the certificate, the signatories identified on the recognized certificate were the holders of the signature-creation data corresponding to the signature verification data referred to or specified in the certificate; Mem...
E-governance is the latest trend in many countries in which the government system is being online to deliver the government services to the citizens. The services can be from Government to Citizen (G2C) and Government to Business (G2B) or Government to Government (G2G) or Government to Employee (G2E) or vice a versa. People can access any application or any scheme from anywhere, anytime. As it comes with the word online, the biggest concern is the security issue. To provide E-authentication to the user there are many cryptographic techniques available. This paper discusses to increase the security, reliability, and non-repudiation of the user's data or information using Digital signature. It is highly secured and well-known method to authenticate and verify an electronic transaction.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.