Let\'s assume a dishonest Alice who sends, encrypts & digital signs a message to
ID: 647607 • Letter: L
Question
Let's assume a dishonest Alice who sends, encrypts & digital signs a message to Bob.
Bob stores the decrypted message and the digital signature in a database.
However Alice is a bad girl and erases all data from her side, including her private/public keys. She then claims she never sent the message.
Is there a solution to this case?
In my case, Alice uses a communication tool that Bob has provided, where the private/public key are generated within the context of the tool (with no 'public key' advertised somewhere else, hence making it even more difficult to prove anything)
Explanation / Answer
Yes, the solution is that her public key needs to be stored in a place that is and will be accessible to Bob.
(such as in Bob's database)
I had not realized that importance of that before reading your question.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.