Abstract
An electronic signature is considered to be valid, if the signature is mathematically correct and if the signer’s public key is classified as authentic. While the first property is easy to decide, the authenticity of the signer’s public key depends on the underlying validity model. To our knowledge there are three different validity models described in various public documents or standards. However, up to now a formal description of these models is missing. It is therefore a first aim of the paper at hand to give a formal definition of the common three validity models. In addition, we describe which application in practice requires which validity model, that is we give a mapping of use cases to validity models. We also analyse which standard implements which model and show how to enforce each model in practice.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
American National Standards Institute ANSI. X9.62: Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA) (November 2005)
German federal network agency: A presentation on validity models, http://www.bundesnetzagentur.de/media/archive/1343.pps
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF Request For Comments, 5280 (May 2008)
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. IETF Request For Comments, 5246 (August 2008)
ETSI. Electronic Signatures and Infrastructures (ESI): Electronic Signature Formats. TS 101 733 V1.7.4 (July 2008)
Housley, R.: Cryptographic Message Syntax (CMS). IETF Request For Comments 3852 (2004)
Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF Request For Comments, 3280 (April 2002)
Recommendation, X.: 509 ITU-T. Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks (August 2005)
National Institute of Standards NIST and Technology. FIPS 186 – Digital Signature Standard (DSS) (May 1994), http://www.itl.nist.gov/fipspubs/fip186.htm
Pinkas, D., Pope, N., Ross, J.: CMS Advanced Electronic Signatures (CAdES). IETF Request For Comments, 5126 (February 2008)
Resnitzky, U.: The Directory-Enabled PKI Appliance: Digital Signatures Made Simple, Approach and Real World Experience. In: 6th Annual PKI R&D Workshop (April 2007), http://middleware.internet2.edu/pki07/proceedings/
Rivest, R., Shamir, A., Adleman, L.: Ax Method for Obtaining Digital Signatures and Public-Key Cryptosystems 21(2), 120–126 (February 1978)
Microsoft TechNet. Renewing a certification authority (January 2005), http://technet.microsoft.com/en-us/library/cc740209WS.10.aspx
Thawte. Certification Practice Statement – Version 3.3 (November 2006), https://www.thawte.com/ssl-digital-certificates/free-guides-whitepapers/pdf/Thawte_CPS_3_3.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Baier, H., Karatsiolis, V. (2010). Validity Models of Electronic Signatures and Their Enforcement in Practice. In: Martinelli, F., Preneel, B. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2009. Lecture Notes in Computer Science, vol 6391. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16441-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-16441-5_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16440-8
Online ISBN: 978-3-642-16441-5
eBook Packages: Computer ScienceComputer Science (R0)