2009
DOI: 10.1007/978-3-642-01244-0_21
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Improvements for the Belgian eID Technology

Abstract: The Belgian Electronic Identity Card enables Belgian citizens to prove their identity digitally and to sign electronic documents. At the end of 2009, every Belgian citizen older than 12 years will have such an eID card. In the future, usage of the eID card may be mandatory. However, irresponsible use of the card may cause harm to individuals. Currently, there exist some privacy and security problems related to the use of the eID card. This paper focuses on solutions to tackle these problems. A new authenticati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
15
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(15 citation statements)
references
References 1 publication
0
15
0
Order By: Relevance
“…The eID card contains three files: (1) a digital picture of the citizen, (2) an identity file which contains the basic identity information and a hash value of the picture file; this file is signed by the National Registry, (3) an address file which contains the citizen's current residence; it is signed by the National Registry together with the identity file to guarantee the link between both files.…”
Section: Belgian Electronic Identity Card Technologymentioning
confidence: 99%
See 4 more Smart Citations
“…The eID card contains three files: (1) a digital picture of the citizen, (2) an identity file which contains the basic identity information and a hash value of the picture file; this file is signed by the National Registry, (3) an address file which contains the citizen's current residence; it is signed by the National Registry together with the identity file to guarantee the link between both files.…”
Section: Belgian Electronic Identity Card Technologymentioning
confidence: 99%
“…The message consists of a header 'KEYGEN', the NRN, the serial number of the eID card and possibly some other user information, making the message card specific. The hash of the message, hash M (keyGenMsg) is then signed with the signature key on the eID card resulting in a 1024 bit signature Sig (2). The fixed format prevents that an adversary obtains Sig by requesting a signature on a forged message; any message to be signed by the eID card should not match this format, except in this protocol.…”
Section: Constructionmentioning
confidence: 99%
See 3 more Smart Citations