Improving the Binding of Electronic Signatures to the Signer by Biometric Authentication

  • Olaf Henniger
  • Björn Schneider
  • Bruno Struif
  • Ulrich Waldmann
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3832)

Abstract

Due to the fact that the biometric characteristics of a person are bound to that person, biometric methods deployed for signer authentication have the potential of improving the binding of electronic signatures to persons. If there is evi dence that a biometric method was used for signer authentication, and if the level of security of this method is suffi ciently high, then the receiver of a signed docu ment can trust that the signature creation was indeed initiated by the legitimate holder of the private signature key. To achieve this goal, an approach to provide evidence of the use of biometric signer authentication has been developed. The approach has been implemented in a prototype electronic signature creation system with fingerprint verification.

Keywords

Smart Card Electronic Signature Supplementary Signature Security Environment Signature Block 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community Framework for Electronic Signatures Google Scholar
  2. 2.
    German Signature Act, Fed. Law Gaz. 2001, Part I no. 22 (May 2001) Google Scholar
  3. 3.
    German Signature Ordinance, Fed. Law Gaz. 2001, Part I no. 59 (November 2001)Google Scholar
  4. 4.
    Public-Key Cryptography Standards (PKCS) #7, Cryptographic Message Syntax Standard v1.5, RSA Laboratories, Bedford, Maine, USA (November 1993)Google Scholar
  5. 5.
    Information technology – Identification cards – Integrated circuit cards – Part 4: Organization, security and commands for interchange. Internat. Standard ISO/IEC 7816-4 (2005) Google Scholar
  6. 6.
    Application Interface for Smart Cards used as Secure Signature Creation Devices, Part 1 – Basic requirements, Version 1 Release 10, CWA 14890-1 (March 2004) Google Scholar
  7. 7.
    Scheuermann, D., Waldmann, U.: Protected Transmission of Biometric User Authentication Data for On-card Matching. In: Proc. of the ACM Symposium on Applied Computing, Nikosia, Cyprus (March 2004)Google Scholar
  8. 8.
    Henniger, O., Struif, B., Franke, K., Ulrich, R.: Trusted Signature Terminal – A trustworthy signature creation environment. In: Horster, P. (ed.) Proc. of the D-A-CH Security Workshop, Erfurt, Germany (2003) (In German)Google Scholar
  9. 9.
    Information Technology – Identification Cards – Integrated Circuit Cards – Part 11: Personal Verification through Biometric Methods. Internat. Standard ISO/IEC 7816-11 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Olaf Henniger
    • 1
  • Björn Schneider
    • 1
  • Bruno Struif
    • 1
  • Ulrich Waldmann
    • 1
  1. 1.Fraunhofer Institute for Secure Information TechnologyDarmstadtGermany

Personalised recommendations