I edited the post because I forgot to include a key constraint to the problem, which is that an attacker can/will be trying to send you false information from “yourself” so you need a way to distinguish. In this case it’s relevant because an attacker could cover you with tattoos before your memories were wiped.
Yep, I actually realized that was a problem even before your edit, because you asked about signing and verification; this is why I said “partially explored”. Still, Memento is IMO a good exploration of someone trying to deal with the issue even if his solution is not fool-proof.
This question is partially explored in Memento.
I edited the post because I forgot to include a key constraint to the problem, which is that an attacker can/will be trying to send you false information from “yourself” so you need a way to distinguish. In this case it’s relevant because an attacker could cover you with tattoos before your memories were wiped.
Yep, I actually realized that was a problem even before your edit, because you asked about signing and verification; this is why I said “partially explored”. Still, Memento is IMO a good exploration of someone trying to deal with the issue even if his solution is not fool-proof.