%0 Conference Proceedings %T Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity %+ University of Passau %A Pöhls, Henrich, C. %Z Part 1: Full Papers %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 7th Trust Management (TM) %C Malaga, Spain %Y Carmen Fernández-Gago %Y Fabio Martinelli %Y Siani Pearson %Y Isaac Agudo %I Springer %3 Trust Management VII %V AICT-401 %P 136-150 %8 2013-06-03 %D 2013 %R 10.1007/978-3-642-38323-6_10 %Z Computer Science [cs]Conference papers %X Digital signatures are by far the most prominent mechanisms to detect violations of integrity. When signing rights are delegated, the integrity protection is gradually weaker as the delegatee’s actions are not considered integrity violations. Taken to an extreme, delegating the right to undetectably change everything to everyone will achieve a property called contingency. Contingency was introduced as the “dual of integrity” in 2009 by Rost and Pfitzmann in German [26] and later translated into English in 2011 [4]. Contingency describes the exact opposite of integrity: the provable absence of integrity. Following this line of privacy research, this paper gives the first rigorous definition of contingency and presents a cryptographic protocol build upon a transparent sanitizable signature scheme. Hence, contingency is a verifiable statement that the signer explicitly desired that the integrity status of data is not verifiable. We analyze legal implications and applications of contingent information. %G English %Z TC 11 %Z WG 11.11 %2 https://inria.hal.science/hal-01468199/document %2 https://inria.hal.science/hal-01468199/file/978-3-642-38323-6_10_Chapter.pdf %L hal-01468199 %U https://inria.hal.science/hal-01468199 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-TM %~ IFIP-WG11-11 %~ IFIP-AICT-401