Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Let\'s assume a dishonest Alice who sends, encrypts & digital signs a message to

ID: 647607 • Letter: L

Question

Let's assume a dishonest Alice who sends, encrypts & digital signs a message to Bob.

Bob stores the decrypted message and the digital signature in a database.

However Alice is a bad girl and erases all data from her side, including her private/public keys. She then claims she never sent the message.

Is there a solution to this case?

In my case, Alice uses a communication tool that Bob has provided, where the private/public key are generated within the context of the tool (with no 'public key' advertised somewhere else, hence making it even more difficult to prove anything)

Explanation / Answer

Yes, the solution is that her public key needs to be stored in a place that is and will be accessible to Bob.
(such as in Bob's database)

I had not realized that importance of that before reading your question.