The Belgian Electronic Identity Card (Overview)

نویسندگان

  • Danny De Cock
  • Christopher Wolf
  • Bart Preneel
چکیده

Currently, Belgium is introducing an electronic version of its identity card. In this article, we shortly describe the card, and give a brief introduction to its cryptographic features. In particular, we focus on the Public-Key Infrastructure (PKI) associated with the card.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security and Privacy Improvements for the Belgian eID Technology

The Belgian Electronic Identity Card enables Belgian citizens to prove their identity digitally and to sign electronic documents. At the end of 2009, every Belgian citizen older than 12 years will have such an eID card. In the future, usage of the eID card may be mandatory. However, irresponsible use of the card may cause harm to individuals. Currently, there exist some privacy and security pro...

متن کامل

Extending the Belgian eID Technology with Mobile Security Functionality

The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a limited number of citizens really use the card in electronic applications. A major reason is the lack of killer functionality and killer applications. This paper presents two reusable extensions to the Belgian eID techno...

متن کامل

Towards a general purpose identity card

Many countries are currently designing or even rolling out electronic identity cards. Simultaneously, eID applications are developed. In many cases, the eID technology is initially integrated in governmental applications. Thereafter, the technology is adopted by other domains (i.e. the financial sector, eHealth services, social networking, corporate environments, ...). However, security, privac...

متن کامل

eID: Identity Management in an Online World

Reliable electronic identity (eID) lies at the core of delivering successful, trustworthy online government services. Yet in the move away from paperand documentary-based forms of face-to-face identity management complex questions arise, such as “How can any user’s true identity be proven?” This paper discusses proposed ‘laws’ for identity. It outlines a need for eID models that recognise the n...

متن کامل

Executive Summary List of Contributions List of Adapid Publications Covered in This Report

This report presents the basic research results of the ADAPID project from in 2007 and 2008. It summarizes twenty research papers, most of which have been published in scientific journals of conferences, while the rest are still subject to submission or review processes. Our research results can be classified in five main areas, corresponding to each of the chapters in this report. First, we pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006