Abstract
Electronic identity (eID) and electronic signature (e-signature) are key concepts of transactional e-government solutions. Especially in Europe, server-based eID and e-signature solutions have recently gained popularity, as they provide enhanced usability while still complying with strict security requirements. To implement obligatory two-factor user-authentication schemes, current server-based eID and e-signature solutions typically rely on one-time passwords delivered to the user via short message service (SMS). This raises several issues in practice, as the use of SMS technology can be cost-effective and insecure. To address these issues, we propose an alternative two-factor user-authentication scheme following a challenge-response approach. The feasibility and applicability of the proposed user-authentication scheme is evaluated by means of two concrete implementations. This way, we show that the proposed authentication scheme and its implementations improve both the cost effectiveness and the security of server-based eID and e-signature solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
References
Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography (2007). http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf. Accessed March 2015
Check Point Software Technologies Ltd.: Media Alert: Check Point and Versafe Uncover New Eurograbber Attack (2012). http://www.checkpoint.com/press/2012/120512-media-alert-cp-versafe-eurograbber-attack.html
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976). http://dx.doi.org/10.1109/TIT.1976.1055638
Fairchild, A., de Vuyst, B.: The Evolution of the e-ID card in Belgium: Data Privacy and Multi-Application Usage. In: The Sixth International Conference on Digital Society, pp. 13–16. Valencia (2012)
Leitold, H., Hollosi, A., Posch, R.: Security Architecture of the Austrian Citizen Card Concept. In: 18th Annual Computer Security Applications Conference, 2002, Proceedings, pp. 391–400 (2002)
Mulliner, C., Borgaonkar, R., Stewin, P., Seifert, J.-P.: SMS-based one-time passwords: attacks and defense (short paper). In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 150–159. Springer, Heidelberg (2013)
National Institute of Standards and Technology: Advanced Encryption Standard (AES) (2001). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Orthacker, C., Centner, M., Kittl, C.: Qualified mobile server signature. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP AICT, vol. 330, pp. 103–111. Springer, Heidelberg (2010)
Rath, C., Roth, S., Schallar, M., Zefferer, T.: A secure and flexible server-based mobile eID and e-signature solution. In: Proceedings of the 8th International Conference on Digital Society, ICDS 2014, Barcelona, Spain. pp. 7–12. IARIA (2014)
The European Parliament and the Council of the European Union: DIRECTIVE 1999/93/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 13 December 1999 on a Community framework for electronic signatures (1999). http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2000:013:0012:0020:EN:PDF
Zefferer, T., Krnjic, V.: Usability evaluation of electronic signature based E-Government solutions. In: Proceedings of the IADIS International Conference WWW/INTERNET 2012, pp. 227–234 (2012)
Acknowledgements
The authors have been supported by the European Commission Seventh Framework Programme through project FutureID, grant agreement number 318424.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Rath, C., Roth, S., Bratko, H., Zefferer, T. (2015). Encryption-Based Second Authentication Factor Solutions for Qualified Server-Side Signature Creation. In: Kő, A., Francesconi, E. (eds) Electronic Government and the Information Systems Perspective. EGOVIS 2015. Lecture Notes in Computer Science, vol 9265. Springer, Cham. https://doi.org/10.1007/978-3-319-22389-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-22389-6_6
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22388-9
Online ISBN: 978-3-319-22389-6
eBook Packages: Computer ScienceComputer Science (R0)