Advertisement

Leveraging the e-passport PKI to Achieve Interoperable Security for e-government Cross Border Services

Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 99)

Abstract

Public Key Infrastructure is identified as the essential architecture upon which security and trust are built, in order to provide authentication, identity verification, encryption and non-repudiation in electronic transactions. Cross border availability of e-government services requires such a security infrastructure to provide a horizontal level of service across all implicated entities. This paper identifies the unique characteristics of a necessary interoperable security infrastructure and towards this goal explores the restrictions of current authentication approaches. Following this, the ability of the electronic passport PKI solution to extend and meet the demands of an interoperable cross border e-id solution is explored, as the requirements of such an authentication mechanism correlate to the characteristics of the deployed e-passport infrastructure. Finally, this paper proposes leveraging the e-passport infrastructure, to build a secure cross border authentication mechanism.

Keywords

Public Key Infrastructure (PKI) e-passport e-ID identification authentication e-government e-voting 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    SEC (2010) 370. Proposal for a Regulation Of The European Parliament And Of The Council on the citizens’ initiative. Brussels (2010)Google Scholar
  2. 2.
    COM (2010) 119. Outcome of the public consultation on the Green Paper on a European Citizens Initiative. Brussels (2010)Google Scholar
  3. 3.
    EU Ministerial Declaration on e-Government. Malmö, Sweden (2009)Google Scholar
  4. 4.
    MEMO/10/681. Digital Agenda: eGovernment Action Plan –“what would it do for me?” Brussels (2010)Google Scholar
  5. 5.
    Zefferer, T.: (AT-TUG). STORK Work Item 3.3.5 Smartcard eID Comparison (2010)Google Scholar
  6. 6.
    Gutierrez, A., Piñuela, A.: STORK Glossary and Acronyms (2009)Google Scholar
  7. 7.
    Patsos, D., Ciechanowicz, C., Piper, F.: The status of National PKIs – A European overview. Information Security Technical Report 15(1), 13–20 (2010)CrossRefGoogle Scholar
  8. 8.
    Arora, S.: National e-ID card schemes: A European overview. Information Security Technical Report 13(2), 46–53 (2008), doi:10.1016/j.istr.2008.08.002CrossRefGoogle Scholar
  9. 9.
    IDABC. Study eID Interoperability for PEGS, Analysis & assessment report (2009)Google Scholar
  10. 10.
    Meister, G., Huhnlein, D., Eichholz, J., Araujo, R.: eVoting with the European Citizen Card. In: BIOSIG 2008, pp. 67–78 (2008), Retrieved from, http://www.ecsec.de/pub/ECC-voting.pdf
  11. 11.
    ICAO. Overview- The ICAO Public Key Directory (2009)Google Scholar
  12. 12.
    Hartmann, M., Körting, S., & Käthler, O.: A Primer on the ICAO Public Key Directory. Retrieved from, http://www.securitydocumentworld.com/client_files/hjp_pkd_promotion-paper_v1_5_20090520.pdf
  13. 13.
    HHS-IRM-2000-0011, HHS IRM Policy for Public Key Infrastructure (PKI); Certification Authority (CA) (2009) Google Scholar
  14. 14.
    Eurosmart. Position Paper European Citizen Card: One Pillar of Interoperable eID Success (2008), Retrieved from, https://www.eid-stork.eu/dmdocuments/public/ecc-position-paper-final.pdf

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  1. 1.Department of Product and Systems Design EngineeringUniversity of the AegeanSyrosGreece

Personalised recommendations