Document Type
Article
Abstract
E-system, a new commerce model, is a new era for business direction. When a principal is absent (goes on an errand or on leave), a well-designed deputy system keeps the business operations working. In the network world, identity verification and any substitute for traditional signature can be done by digital signature [1]. Deputy signature guarantees the existence of deputy system in e-system. Current deputy mechanism addresses the verification of deputy signature. No research has been done on the prevention of the illegal use of deputy system when the principal returns and the deputy system is not in use. We propose a mechanism to solve the problem of illegal use of deputy system when the power of deputy system is not legally “ON.”
Recommended Citation
Chen, Jonathan Jen-Rong; Ling, Kai-Hsiung; Liu, Yuan-Chi; and Pan, Yen-Ling, "Security of Deputy Signature" (2002). ICEB 2002 Proceedings (Taipei, Taiwan). 190.
https://aisel.aisnet.org/iceb2002/190