P325 - Open Identity Summit 2022

Permanent URI for this collectionhttps://dl.gi.de/handle/20.500.12116/38695

Authors with most Documents  

Browse

Search Results

1 - 2 of 2
  • Conference Paper
    eIDAS 2.0: Challenges, perspectives and proposals to avoid contradictions between eIDAS 2.0 and SSI
    (Gesellschaft für Informatik e.V., 2022) Schwalm, Steffen; Albrecht, Daria; Alamillo, Ignacio; Roßnagel, Heiko; Schunck, Christian H.; Mödersheim, Sebastian
    The proposal for review of the eIDAS Regulation from 2021 has opened strong expectations for a deep change in traditional identity models. The user-centric identity model proposed starts with the creation of European Digital Identity Wallets that will enable citizens’ control over their data in identification and authentication processes without control by entities providing the identification services. Likewise, with the proposed legal rules for giving legal certainty to electronic ledgers and blockchains, [eIDAS2]opens possibilities to decentralization, especially for the provision and management of user’s attributes. The implementation of qualified trust services for attestations or electronic ledgers limits decentralization by requirement of a trusted 3rd party. Standardization will be key in assuring interoperability at the EU level. What are the challenges and opportunities of eIDAS 2.0? And what are the main focuses and needs of (European) standardization? These and other questions will be analysed and discussed in the paper.
  • Conference Paper
    Combination of x509 and DID/VC for inheritance properties of trust in digital identities
    (Gesellschaft für Informatik e.V., 2022) Bastian, Paul; Stöcker, Carsten; Schwalm, Steffen; Roßnagel, Heiko; Schunck, Christian H.; Mödersheim, Sebastian
    The proposal for review of the eIDAS Regulation from 2021 has opened strong expectations for a deep change in traditional identity models. The user-centric identity model proposed starts with the creation of European Digital Identity Wallets that will enable citizens’ control over their data in identification and authentication processes without control by entities providing the identification services. Likewise digital identities and digital signatures are in place and interoperability between existing solutions mainly based on x509 certificates and decentralized PKI using DID/VC foreseeable. The paper provides various options to address different aspects in combining x509 and DID/VC approaches.
Load citations