Skip to main content

Identification and Trust Techniques Compatible with eIDAS Regulation

  • Conference paper
  • First Online:
Security and Privacy in New Computing Environments (SPNCE 2019)

Abstract

This study presents the current situation (starting with January 2015) related to EU Regulation eIDAS. eIDAS represents the latest EU initiative to build a common framework for electronic identification and trust services. It was the intention of European Council to elaborate and impose a minimal legislation which should guarantee compatibility and interoperability of national identification and trust systems while still allowing the existence of local legal flavors. It is expected that eIDAS will offer safer interactions between various entities (such as private enterprises, public enterprises, citizens, administration) thus contributing to the growth of European market and the improvement of cross-border transactions. Exposure of the current state is combined with suggestions and discussions about improvements to the former eID resulting from the new regulation. A section on the implementation of interoperability framework in some member states gives a first insight into the work which will be required in the next few years for completing the implementation. This paper presents a thorough review of the main identification and trust techniques in eIDAS and the differences to previous or more local similar frameworks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. European Parliament: Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC, Official Journal of the European Union, OJ L 257, pp. 73–114, 28 August 2014

    Google Scholar 

  2. European Comission. https://ec.europa.eu/digital-single-market/en/news/feasibility-study-cross-border-use-eid-and-authentication-services-eidas-compliant-support-0

  3. European Commission. https://ec.europa.eu/digital-single-market/en/trust-services-and-eid

  4. European Council: Special meeting of the European Council (Art. 50), 25 November 2018. https://www.consilium.europa.eu/en/meetings/european-council/2018/11/25/

  5. ComputerWeekly: EU sees eIDAS regulation come into full force, September 2018

    Google Scholar 

  6. KPMG Switzerland: Swiss companies must comply with eIDAS for digital access to EU markets. https://blog.kpmg.ch/swiss-companies-must-comply-eidas-digital-access-eu-markets/

  7. Norwegian Communication Authority. https://eng.nkom.no/technical/trust-services/eidas/eidas-regulation

  8. Thales: The Impact of the European eIDAS Regulation. www.thales-esecurity.com

  9. European Comission. https://ec.europa.eu/digital-single-market/en/e-identification

  10. Leitold, H., Zwattendorfer, B.: STORK: architecture, implementation and pilots. In: ISSE 2010 Securing Electronic Business Processes, pp 131–142 (2010)

    Chapter  Google Scholar 

  11. Sideridis, Alexander B., Protopappas, L., Tsiafoulis, S., Pimenidis, E.: Smart cross-border e-Gov systems and applications. In: Katsikas, Sokratis K., Sideridis, Alexander B. (eds.) e-Democracy 2015. CCIS, vol. 570, pp. 151–165. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27164-4_11

    Chapter  Google Scholar 

  12. Secure ID News. https://www.secureidnews.com/news-item/eidas-digital-id-finds-use-in-cross-border-european-banking/

  13. European Comission. https://ec.europa.eu/digital-single-market/en/news/questions-answers-trust-services-under-eidas

  14. Federal Office for Information Security: eIDAS Notification of the German eID. https://www.bsi.bund.de/EN/Topics/ElectrIDDocuments/German-eID/eIDAS-notification/eIDAS_notification_node.html

  15. Zwattendorfer, B., Tauber, A.: Secure cloud authentication using eIDS. In: Proceedings of IEEE CCIS2012 (2012)

    Google Scholar 

  16. ENISA: Qualified Website Authentication Certificates, December 2015. https://www.enisa.europa.eu/

  17. ENISA: Security guidelines on the appropriate use of qualified website authentication certificates, December 2016. https://www.enisa.europa.eu/

  18. Pimenidis, E., Georgiadis, C.K.: Can e-Government applications contribute to performance improvement in public administration? Int. J. Oper. Res. Inf. Syst. 5(1), 48–57 (2014)

    Article  Google Scholar 

  19. European Commission. https://ec.europa.eu/digital-single-market/en/news/questions-answers-trust-services-under-eidas

Download references

Acknowledgement

The work has been funded through the research project COOPID mySMIS-115656.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Mocanu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mocanu, S., Chiriac, A.M., Popa, C., Dobrescu, R., Saru, D. (2019). Identification and Trust Techniques Compatible with eIDAS Regulation. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21373-2_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21372-5

  • Online ISBN: 978-3-030-21373-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics