Abstract
The appeals for interoperable and decentralized Electronic Identity Management are rapidly increasing, especially since their contribution towards interoperability across the entire “electronic” public sector, effective information sharing and simplified access to electronic services, is unquestioned. This paper presents an efficient and user-centric method for storing multiple users’ identifiers in X.509 digital certificates while preserving their confidentiality, allowing for interoperable user identification in environments where users cannot be identified by an all embracing unique identifier.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Park, J., Lee, J., Lee, H., Park, S., Polk, T.: Internet X.509 Public Key Infrastructure Subject Identification Method (SIM), National Institute of Standards and Technology (2006)
Federal Information Processing Standards, Publication (FIPS PUB) 112, Password Usage (1985)
Federal Information Processing Standards Publication (FIPS PUB) 180-1, Secure Hash Standard (1995)
Europe’s Information Society Thematic Portal. A question of identity, http://www.ec.europa.eu
Mont, C., Bramhall, P., Pato, J.: On Adaptive Identity Management: The next generation of Identity Management Technologies, HP Labs Technical Report, HPL-2003-149 (2003)
Lips M.: Identity Management in Information age Government exploring Concepts, Definitions, Aproaches and Solutions (2008)
Hayat, A., Leitold, H., Rechberger, C., Rossler, T.: Survey on EU’s Electronic-ID Solutions, Vienna (2004)
Drogkaris, P., Lambrinoudakis, C., Gritzalis, S.: Introducing Federated Identities to One-Stop-Shop e-Government Environments: The Greek Case. In: Cunningham, P., Cunningham, D. (eds.) 19th Conference on eChallenges 2009, Istanbul, Turkey. eChallenges e-2009 Conference Proceedings, pp. 115–121 (October 2009)
Drogkaris, P., Geneiatakis, D., Gritzalis, S., Lambrinoudakis, C., Mitrou, L.: Towards an Enhanced Authentication Framework for eGovernment Services: The Greek case. In: Ferro, E., Scholl, J., Wimmer, M. (eds.) EGOV 2008, 7th International Conference on Electronic Government, Torino, Italy, pp. 189–196. Trauner Verlag Schriftenreihe Informatik (September 2008)
Greek Constitution Articles 2 § 1 (human dignity) and 9 A (right to protection of personal data)
Hayat A., Leitold H., Rechberger C., Rössler T.: Survey on EU’s Electronic-ID Solutions’, Vienna (2004)
Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules (2001)
Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Lenstra, A., Verheul, E.: Selecting cryptographic key sizes. Journal of Cryptology 14(4), 255–293 (2001)
Federal Information Processing Standards Publication 180-2, Secure hash standard (2002)
Schneier on Security, Cryptanalysis of SHA-1, http://www.schneier.com
McKenzie, R., Crompton, M., Wallis, C.: Use Cases for Identity Management in E-Government. IEEE Security and Privacy 6(2), 51–57 (2008)
Greenwood, D., Dempster, A., Laird, M., Rubin, D.: The context for Identity Management Architectures and Trust Models. In: OECD Workshop on Digital Identity Management (2007)
Directive 97/66/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the telecommunications sector. Official Journal L L 024, 1–8 (1997)
Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. Official Journal L 013, 00120020 (2000)
Directive 01/45/EC of the European Parliament and the Council of Ministers on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data. Official Journal L 008, 122 (2001)
Hansen, M., Pfitzmann, A., Steinbrecher, S.: Identity management throughout one’s whole life. Information Security Technical Report 13(2), 83–94 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Drogkaris, P., Gritzalis, S. (2011). Attaching Multiple Personal Identifiers in X.509 Digital Certificates. In: Camenisch, J., Lambrinoudakis, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2010. Lecture Notes in Computer Science, vol 6711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22633-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-22633-5_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22632-8
Online ISBN: 978-3-642-22633-5
eBook Packages: Computer ScienceComputer Science (R0)