...
Design | Registration | Credential | Credential | Signing | Tamper |
| Ease-of-use | Portability | Cost | Accountability | |
---|---|---|---|---|---|---|---|---|---|---|---|
Theoretical PKI alternative | In-person proofing at USPO | PKI private key | In-person | Digital Signature: document hash is encrypted with private key. Requires some type of reader to input the key, and, client software to execute the hashing and encrypting | Store signed document and digital signature |
| Fails: complex and mysterious | Fails: reader required | Fails: cost of person-proofing and certificate issuance | Strong confidence in identity and credential, however, custody of credential not guaranteed | |
| Theoretical digitized signature alternative |
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|