Skip to main content

Validity Models of Electronic Signatures and Their Enforcement in Practice

  • Conference paper
Public Key Infrastructures, Services and Applications (EuroPKI 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6391))

Included in the following conference series:

Abstract

An electronic signature is considered to be valid, if the signature is mathematically correct and if the signer’s public key is classified as authentic. While the first property is easy to decide, the authenticity of the signer’s public key depends on the underlying validity model. To our knowledge there are three different validity models described in various public documents or standards. However, up to now a formal description of these models is missing. It is therefore a first aim of the paper at hand to give a formal definition of the common three validity models. In addition, we describe which application in practice requires which validity model, that is we give a mapping of use cases to validity models. We also analyse which standard implements which model and show how to enforce each model in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. American National Standards Institute ANSI. X9.62: Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA) (November 2005)

    Google Scholar 

  2. German federal network agency: A presentation on validity models, http://www.bundesnetzagentur.de/media/archive/1343.pps

  3. Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF Request For Comments, 5280 (May 2008)

    Google Scholar 

  4. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. IETF Request For Comments, 5246 (August 2008)

    Google Scholar 

  5. ETSI. Electronic Signatures and Infrastructures (ESI): Electronic Signature Formats. TS 101 733 V1.7.4 (July 2008)

    Google Scholar 

  6. Housley, R.: Cryptographic Message Syntax (CMS). IETF Request For Comments 3852 (2004)

    Google Scholar 

  7. Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF Request For Comments, 3280 (April 2002)

    Google Scholar 

  8. Recommendation, X.: 509 ITU-T. Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks (August 2005)

    Google Scholar 

  9. National Institute of Standards NIST and Technology. FIPS 186 – Digital Signature Standard (DSS) (May 1994), http://www.itl.nist.gov/fipspubs/fip186.htm

  10. Pinkas, D., Pope, N., Ross, J.: CMS Advanced Electronic Signatures (CAdES). IETF Request For Comments, 5126 (February 2008)

    Google Scholar 

  11. Resnitzky, U.: The Directory-Enabled PKI Appliance: Digital Signatures Made Simple, Approach and Real World Experience. In: 6th Annual PKI R&D Workshop (April 2007), http://middleware.internet2.edu/pki07/proceedings/

  12. Rivest, R., Shamir, A., Adleman, L.: Ax Method for Obtaining Digital Signatures and Public-Key Cryptosystems 21(2), 120–126 (February 1978)

    Google Scholar 

  13. Microsoft TechNet. Renewing a certification authority (January 2005), http://technet.microsoft.com/en-us/library/cc740209WS.10.aspx

  14. Thawte. Certification Practice Statement – Version 3.3 (November 2006), https://www.thawte.com/ssl-digital-certificates/free-guides-whitepapers/pdf/Thawte_CPS_3_3.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Baier, H., Karatsiolis, V. (2010). Validity Models of Electronic Signatures and Their Enforcement in Practice. In: Martinelli, F., Preneel, B. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2009. Lecture Notes in Computer Science, vol 6391. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16441-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16441-5_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16440-8

  • Online ISBN: 978-3-642-16441-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics