“Applications-Driven PKI”
نویسندگان
چکیده
This paper presents two related activities, the first is the OASIS Digital Signature Services (DSS) standard, the second is the application of digital signatures to electronic invoicing as recognised under recent European legislation. DSS can be used to support a range of signature formats including the binary “cryptographic message syntax” and XML signatures, as well as related extended formats for “advanced electronic signatures” defined in European standards. The DSS standard is built around the general XML web based services structure and can be used with HTTP and SOAP transport protocols. The paper describes how DSS supports the needs of eInvoicing signature creation and verification, minimising the per user installation costs, improving security and reducing the need for revocation. It also describes how DSS verification greatly simplifies the complexity of user systems and facilitates centralised management of security within an organisation. Finally, the paper considers the requirements for maintaining the verifiability of signed invoices stored over a period of around 10 years and how this can be met by DSS verification services with time-stamping and / or archive services. E-Invoicing in Europe A directive was issued in 2001 with the aim of harmonising the requirements relating to “Value Added Tax” (VAT) in Europe [VATDirective]. This tax is a form purchase tax but is applicable to all sales including supplies of goods between companies to which value is added (hence the name value added tax). VAT legislation requires invoices be produced and recorded on all sales to which VAT is applicable and there are pan European rules on how this tax is itemised to facilitate auditing of the tax collection. The recent directive on VAT harmonisation defines further rules for the form of VAT invoices, including requirements for the security of electronic invoices. It states that: “Invoices sent by electronic means shall be accepted by Member States provided that the authenticity of the origin and integrity of the contents are guaranteed ..” The VAT directive then goes on to identify alternative solutions to providing such protection including protection using a form of digital signature based on a PKI (referred to in EU legislation as an “advanced electronic signature”). Records of these signed e-invoices need to be kept for a number of years, varying from country to country, but can be up to 10 years or more. It 6th Annual PKI R&D Workshop Proceedings
منابع مشابه
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI)
This paper describes a flexible and general purpose PKI platform providing an easily interoperable security infrastructure. Developed at AT&T Labs, the architecture is part of the UCAID/Internet2 efforts in PKI and scalable security. The architecture can host multiple certificate authorities (CAs) from different vendors in a uniform and scalable manner. This facilitates scalable operation with ...
متن کاملThe Security Advantages of Hardware Tokens over Software Tokens for PKI Applications
.......................................................................................................3 Background ..................................................................................................4 Soft Tokens and Their Vulnerabilities ..........................................................5 Hardware Tokens and Smart Cards ......................................................
متن کاملSHEMP: Secure Hardware Enhanced MyProxy
While PKI applications differ in how they use keys, all applications share one assumption: users have keypairs. In previous work, we established that desktop keystores are not safe places to store private keys, because the TCB is too large. These keystores are also immobile, difficult to use, and make it impossible for relying parties to make reasonable trust judgments. Since we would like to u...
متن کاملSecurity middleware for enhancing interoperability of Public Key Infrastructure
This paper describes a security middleware for enhancing the interoperability of public key infrastructure (PKI). Security is a key concern in e-commerce and is especially critical in cross-enterprise transactions. Public key cryptography is widely accepted as an important mechanism for addressing the security needs of e-commerce transactions because of its ability to implement nonrepudiation. ...
متن کاملA Solution to Privacy Issues in the Use of Biometrics in PKI
In this short paper we introduce a technique for a more private form of biometric identification to be used in PKI applications. We discuss how this technique can be applied within Internet banking. In particular we see the opportunity to apply these techniques in some of the developing PKI markets in Asia, where the legacy PKI systems will not form a barrier to entry. Biometric techniques have...
متن کاملChord-PKI: A distributed trust infrastructure based on P2P networks
Many P2P applications require security services such as privacy, anonymity, authentication, and non-repudiation. Such services could be provided through a hierarchical Public Key Infrastructure. However, P2P networks are usually Internet-scale distributed systems comprised of nodes with undetermined trust level, thus making hierarchical solutions unrealistic. In this paper, we propose Chord-PKI...
متن کامل