Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.2: A study on PKI and biometrics
Title: “D3.2: A study on PKI and biometrics”
Author: WP3
Editors: Mark Gasson (University of Reading, UK)
Martin Meints (ICPP, Germany)
Kevin Warwick (University of Reading, UK)
Reviewers: James Backhouse (London School of Economics, UK)
Paul De Hert (Leiden University, the Netherlands)
Type: [Deliverable]
Date: 10.11.20
Class: [Public]
File:
Summary |
Public-Key Infrastructures (PKIs) have been a hot topic for several years now, and many – often very practical – questions are still open. These certainly include corruption of keys or algorithms, usability, awareness of users and security issues. With respect to high-tech IDs, advanced PKI, e.g. supporting convertible credentials, could be developed. Until now, official PKI in member states, working according to the Digital Signature Act and national signature law, rarely work with pseudonymous keys and certificates. To improve the diffusion of electronic signatures into European markets six concrete measures are suggested. Both technologists and lawyers have experience in research on biometrics in the form of technology assessment and conceptualisation. However, for many kinds of biometrics it is still unclear how much security and privacy can be achieved. As the biometric market evolves in response to technology enhancement and political pressure, it is imperative that research on this topic is up to date, especially with respect to avoidance of discrimination and to privacy-compliance. This document forms a comprehensive study on PKIs and biometrics, specifically from the legal and technological point of view, with focus put on the possibility of privacy-enhancing implementations. |
Copyright Notice:
This document may not be copied, reproduced, or modified in whole or in part for any purpose without written permission from the FIDIS Consortium. In addition to such written permission to copy, reproduce, or modify this document in whole or part, an acknowledgement of the authors of the document and all applicable portions of the copyright notice must be clearly referenced.
The circulation of this document is restricted to the staff of the FIDIS partner organisations and the European Commission. All information contained in this document is strictly confidential and may not be divulged to third parties without the express permission of the partners.
All rights reserved.
PLEASE NOTE: This document may change without notice – Updated versions of this document can be found at the FIDIS NoE website at www.fidis.net.
Foreword
FIDIS partners from various disciplines have contributed as authors to this document. The following list names the main contributors for the chapters of this document:
Chapter | Contributor(s) |
() | Martin Meints, ICPP Mark Gasson, University of Reading, |
() | Lorenz Mueller, AXSionics, Mark Gasson, University of Reading |
() | Jos Dumortier, KULRD () Henry Krasemann, ICPP, (, ), Ammar Alkassar, SIRRIX (), Matthias Bauer, ICPP (), Xavier Huysmans, KULRD () Heiko Rossnagel, University of Frankfurt (, ) Mark Gasson, University of Reading |
() | Els Kindt, KULRD (, , ) Vasiliki Andronikou, ICCS () Martin Meints, ICPP (, , ) Vaclav Matyas, MU (, , ) Lorenz Mueller, AXSionics () Michael Backes, IBM () Dionysios Demetis, LSE () Mark Gasson, University of Reading |
() | Els Kindt, KULRD () Martin Meints, ICPP () Mark Gasson, University of Reading |
() | Mark Gasson, University of Reading, Martin Meints, ICPP |
Table of Contents
Denis Royer | 1 / 40 |