Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

Identification and Trust Techniques Compatible with eIDAS Regulation

Download
253 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_55,
        author={Stefan Mocanu and Ana Chiriac and Cosmin Popa and Radu Dobrescu and Daniela Saru},
        title={Identification and Trust Techniques Compatible with eIDAS Regulation},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={eIDAS eID Trust User identification Interoperability Electronic signature Remote signing},
        doi={10.1007/978-3-030-21373-2_55}
    }
    
  • Stefan Mocanu
    Ana Chiriac
    Cosmin Popa
    Radu Dobrescu
    Daniela Saru
    Year: 2019
    Identification and Trust Techniques Compatible with eIDAS Regulation
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_55
Stefan Mocanu1,*, Ana Chiriac2, Cosmin Popa2, Radu Dobrescu1, Daniela Saru1
  • 1: University Politehnica of Bucharest
  • 2: Ingenios.ro, George Constantinescu 2C
*Contact email: stefan.mocanu@upb.ro

Abstract

This study presents the current situation (starting with January 2015) related to EU Regulation eIDAS. eIDAS represents the latest EU initiative to build a common framework for electronic identification and trust services. It was the intention of European Council to elaborate and impose a minimal legislation which should guarantee compatibility and interoperability of national identification and trust systems while still allowing the existence of local legal flavors. It is expected that eIDAS will offer safer interactions between various entities (such as private enterprises, public enterprises, citizens, administration) thus contributing to the growth of European market and the improvement of cross-border transactions. Exposure of the current state is combined with suggestions and discussions about improvements to the former eID resulting from the new regulation. A section on the implementation of interoperability framework in some member states gives a first insight into the work which will be required in the next few years for completing the implementation. This paper presents a thorough review of the main identification and trust techniques in eIDAS and the differences to previous or more local similar frameworks.