...

In the design of e-signature systems there are several independent components, each of which present choices among technical alternatives, and these choices can be mapped to our requirements:

Design
Alternative

Registration

Credential

Credential
Delivery

Signing
Technology

Tamper
Evident
Packaging

 

Ease-of-use

Portability

Cost

Accountability

 

In-person proofing at USPO

PKI private key

In-person

Digital Signature: document hash is encrypted with private key.  Requires some type of reader to input the key, and, client software to execute the hashing and encrypting

Store signed document and digital signature

 

Fails: complex and mysterious

Fails: reader required

Fails: cost of person-proofing and certificate issuance

Strong confidence in identity and credential, however, custody of credential not guaranteed