Abstract
In this chapter we deal with validity models for digital signatures in the hierarchical trust model. In order to explain what we mean by this, we start with an example. Paul sells his house to Anna on 1 October 2009. Paul signs the sales contract digitally. The certificate that authenticates Paul’s signature verification key expires on 31 July 2010. Should Paul’s signature still be considered valid after the certificate has expired? In the most common validity models, for example in the shell model from the PKIX standard, the answer is “no”. This does not seem to make much sense since the transaction is still valid. Therefore, the German signature law requires an electronic signature to be valid independent of the expiration of the certificate as long as the certificate was valid at the time the signature was created. This so-called chain model is a completely different validity model for signatures. In this chapter we discuss the various validity models for digital signatures in more detail.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, in IETF Request for Comments, 5280, May 2008
D. Pinkas, N. Pope, J. Ross, CMS advanced electronic signatures (CAdES), in IETF Request for Comments, 5126, Feb 2008
U. Resnitzky, The directory-enabled PKI appliance: digital signatures made simple, approach and real world experience, in 6th Annual PKI R&D Workshop, Gaithersburg, Apr 2007. http://middleware.internet2.edu/pki07/proceedings/
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). Validity Models. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-40657-7_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40656-0
Online ISBN: 978-3-642-40657-7
eBook Packages: Computer ScienceComputer Science (R0)