Skip to main content

Validity Models

  • Chapter
  • First Online:
Introduction to Public Key Infrastructures

Abstract

In this chapter we deal with validity models for digital signatures in the hierarchical trust model. In order to explain what we mean by this, we start with an example. Paul sells his house to Anna on 1 October 2009. Paul signs the sales contract digitally. The certificate that authenticates Paul’s signature verification key expires on 31 July 2010. Should Paul’s signature still be considered valid after the certificate has expired? In the most common validity models, for example in the shell model from the PKIX standard, the answer is “no”. This does not seem to make much sense since the transaction is still valid. Therefore, the German signature law requires an electronic signature to be valid independent of the expiration of the certificate as long as the certificate was valid at the time the signature was created. This so-called chain model is a completely different validity model for signatures. In this chapter we discuss the various validity models for digital signatures in more detail.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, in IETF Request for Comments, 5280, May 2008

    Google Scholar 

  2. D. Pinkas, N. Pope, J. Ross, CMS advanced electronic signatures (CAdES), in IETF Request for Comments, 5126, Feb 2008

    Google Scholar 

  3. U. Resnitzky, The directory-enabled PKI appliance: digital signatures made simple, approach and real world experience, in 6th Annual PKI R&D Workshop, Gaithersburg, Apr 2007. http://middleware.internet2.edu/pki07/proceedings/

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). Validity Models. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40657-7_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40656-0

  • Online ISBN: 978-3-642-40657-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics