The preservation of digital signatures on the blockchain

Stephen Thompson


The blockchain is a distributed network that records digital transactions on a publicly-accessible ledger. This paper explores whether blockchain technology is a suitable platform for the preservation of digital signatures and key pairs (public and private keys). Conventional infrastructures use digital certificates, issued by certification authorities, to declare the authentication of key pairs and digital signatures. However, this paper suggests that the blockchain’s hash functions can replace those certificates on the grounds of better privacy, that the nature of the network removes the problem of a single point of failure and that hashing is a form of authentication that does not require trust in a third-party authority. This article was an appendix to the research paper, Blockchain Technology for Recordkeeping which is available in the Reports section at


digital signatures, blockchain; keys; encryption; authenticity; trust

Full Text:



Allen, C. (2015, October 9). Schnorr signatures: An overview. WebOfTrustInfo. Retrieved from

Allen, C., Brock, A., Buterin, V., Callas, J., Dorje, D., Lundkvist, C., Kravchenko, P., Nelson, J., Reed, D., Sabadello, M., Slepak, G., Thorp, N. & Wood, H. T. (2015). Decentralized public key infrastructure. A White Paper from Rebooting the Web of Trust. Retrieved from

Amati, F. (2016, January). Using the blockchain as a digital signature scheme. Medium blog. Retrieved from

Anon. (2015, October 31). The trust machine: The promise of the blockchain. The Economist. Retrieved from

ANSI X9.95-2012. Trusted time stamp management and security. Retrieved from

Bentov, I., Lee, C., Rosenfeld, M. & Mizrahi, A. (2014). Proof of activity: Extending Bitcoin’s proof-of-work via proof-of-stake. [Extended Abstract] Performance Evaluation Review, 42 93), 34-37.

Blanchette, Jean-François. (2012). Burdens of proof: Cryptographic culture and evidence law in the age of electronic documents. Cambridge: The MIT Press.

Blanchette, Jean-François. (2006). The digital signature dilemma. Annales des Telecommunications, 61(7), pp. 908-923. Retrieved from

Black, P. & Layton, R. (2014). Be careful who you trust: Issues with the Public Key Infrastructure. 2014 Fifth Cybercrime and Trustworthy Computing Conference. IEEE Computer Society. Retrieved from Retrieved from

BlockNotary. Retrieved from

Boudrez, F. (2007). Digital signatures and electronic records. Archival Science, 7(2), pp. 179-193.

Buldas, A., Laanoja, R. & Truu, A. (2014). Efficient implementation of keyless signatures with hash sequence authentication. [Unpublished paper.] Retrieved from

CGI (2004). Public key encryption and digital signature: How do they work? White Paper. Retrieved from

Clanchy, M. T. (2013). From memory to written record: England 1066-1307. Chichester, John Wiley & Sons Ltd.

CGSB 72.34-2015, 0.1. Electronic records as documentary evidence. Personal communication of draft by e-mail.

Cumming, K. & Findlay, C. (2016). Report on blockchain: Applications and implications. Recordkeeping Roundtable. Retrieved from

Curry, I. (2001, March). An introduction to cryptography and digital signatures. Entrust. Retrieved from

Duranti, L. (1989). Diplomatics: New uses for an old science. Archivaria, 28, pp. 17-27.

Findlay, C. (2015). Decentralised and inviolate: the blockchain and digital archives. Retrieved from

Garderen, P. van. (2016, May 17). Blockchain and digital preservation. Presentation at Simon Fraser University [Video file]. Retrieved from

Gladney, H. (2007). Preserving digital information. Berlin, Heidelberg: Springer.

Guardtime. Retrieved from

ISO 16363:2012. Space data and information transfer systems – Audit and certification of trustworthy digital repositories. Geneva: ISO. Retrieved from

ISO 15489-1:2016. Information and documentation – Records management – Part 1: Concepts and principles. Geneva: ISO. Retrieved from

ISO/TR 18492:2005. Long-term preservation of electronic document-based information. Geneva: ISO. Retrieved from

Kohnfelder, L. (1978). Towards a practical public key cryptosystem. Bachelor’s degree thesis. Retrieved from

Lea, T. (2016). Introductory course – The power of the blockchain. What is blockchain? Retrieved from

Lemieux, V. (2016). Trusting records: Is blockchain technology the answer? Records Management Journal, 26(2), pp. TBA.

Li, V. (2016, March). Bitcoin’s useful backbone: Blockchain technology gains use in business, finance and contracts. ABA Journal, 102(3), p.31. Retrieved from

OCLC/RLG Working Group. (2002, June). Preservation metadata and the OAIS Information Model: A metadata framework to support the preservation of digital objects. Retrieved from

Pedro, F. (2015). Understanding Bitcoin: Cryptography, engineering and economics. Chichester: John Wiley & Sons Ltd.

RFC 3161. (2001, August). Internet X.509 public key infrastructure time-stamp protocol (TSP). Retrieved from

Rouse, M. (2014a). Digital signature. SearchSecurity.TechTarget. Retrieved from

Rouse, M. (2014b). Proof of concept (POC). SearchSecurity.TechTarget. Retrieved from

Ruggieri, F. (2014). Security in digital data preservation. Digital Evidence and Electronic Signature Law Review, 11, pp. 100-106.

Stamou, K., Aubert, J., Gateau, B., Morin, J-H. (2012). Preliminary requirements on trusted third parties for service transactions in cloud environments. 2013 46th Hawaii International Conference on System Sciences. Institute of Electrical and Electronics Engineers, 4976-4983.

Wirdum, A. van. (2016, April 14). The power of Schnorr: The signature algorithm to increase Bitcoin’s scale and privacy. Bitcoin Magazine. Retrieved from


  • There are currently no refbacks.

Copyright (c) 2017 Stephen Thompson