• No results found

Advies 2 - Bijlage 1 - Digitale Handtekening en Elektronische Certificaten

N/A
N/A
Protected

Academic year: 2021

Share "Advies 2 - Bijlage 1 - Digitale Handtekening en Elektronische Certificaten"

Copied!
20
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

Electronic Signatures

and Certificates

in Healthcare

Filip De Meyer

Dept. of Medical Informatics Gent

Phone: +32 9 240 34 40

(2)

Why do you require a signature

on a document ?

♦ Prove that the author/sender is the one he claims

to be (identity and roles).

♦ Prove that writing/sending the document is

something he wanted to do.

♦ Prove that the content has not changed and is

complete (integrity requirement).

♦ Date (and time) stamping.

(3)

Electronic Signatures:

Signature dynamics

Biometrics: voice, fingerprint, face,

retina,…

Key based cryptographic functions

– Public key cryptography

Digital signatures are

based on public key cryptography

(4)

Digital signature definition

A digital signature of a

A digital signature of a

A digital signature of a

A digital signature of a

plaintext is the result of the

plaintext is the result of the

plaintext is the result of the

plaintext is the result of the

encryption

encryption

encryption

encryption of the

of the

of the hash

of the

hash

hash

hash result

result

result

result

of the plaintext with the

of the plaintext with the

of the plaintext with the

of the plaintext with the

private encryption key of the

private encryption key of the

private encryption key of the

private encryption key of the

sender (author)

sender (author)

sender (author)

sender (author)

(5)

A digital signature is a function

of

The plaintext (or message) on which the

message is generated

The private key of the person who is

signing

A handwritten signature is independent of the context and is only function of the signature dynamics of the person who signs

(6)

Cryptographic key pair & certificates

Key pair for encryption for confidentiality

Key pair for digital signature

Key pair for authentication

Identity certificate (public key certificate)

Attribute certificate(s)

– Professional qualification – Professional registration – Professional role(s)

(7)

Signature Key Management

♦ Generate key pair

♦ Private (signature creation) key handling

– Put in a highly secure environment (smartcard) – Personalise the smartcard

– Generate pincode

– Distribute pincode and smartcard

♦ Public (signature verification) key handling

– Create a certificate (bind the ID to the key-pair) – Publish the certificate (directory)

(8)

Trust in signature only when

♦ private keys are kept private in a very secure and

tamperproof environment by the key holder

♦ Association between public key and the key

holder is guaranteed.

Store private keys into a

smartcard

A TSP should issue key

certificates

(9)

Trust Service Provider (TSP)

Certification authorities

Attribute authorities

Registration authorities

Time Stamping authorities

Privacy enhancing service providers

(pseudonymisation)

An entity which can be used by other entities as a trusted intermediary in a communication or verification process, or as a trusted information service provider

(10)

Trust Service Providers

(signatures)

Registration Authority (RA)

– Verifies credentials:

• Identity

• Attribute: mandate, quality, …

Certification Authority (CA)

– Puts the conclusion of the RA into an electronic certificate

– The certificate is electronically signed by the CA

– The signed certificate is sent to a directory service provider

(11)

Certification of attributes

Check credentials Registration authority Bind identity to attribute Certification authority Registry Role OK ? Correct ID ? Validity period ? Revoked ? Verify certificate User certificates

(12)

Different approaches

One identity to many roles

– One signature per natural person

– Mandates, roles, qualities, etc. are expressed in an attribute certificate

– Is close to the real world situation

– A role/certificate -> privacy protection

One identity to one capability

– One (different) signature per attribute – A different role = different signature

(13)

Structure of a signed document

Text Part Role certif. 2 Role certif. 1 Certif. … SIGNATURE

(14)

Conflict situations: abuse of a

function (certificate)

Same in both approaches

Cannot be prevented on the signature level

Similar as in paper based world: cannot be

prevented at all

On the application level: warn the user for

abusive use of certificates

Present pick-list of certificates to the

signatory

(15)

The reference for the document is: Filename: C:\requests\doc000503.rtf Date of last update: 4thMay 2000

Author: Mary, secretary of Dr. Jekyll

Subject: request for information on Homer Simpson to VUB Filesize: 35.254 bytes

You are about to sign a document

Identification of the Signatory

Name: James Jekyll

Signature certificate ID: 15668de4 issued by: KSZ-BCSS Certificate is valid until: 5/1/2009

Check one or more certificates:

2/1/05 Head of Dept. – ORL/UCL

UCL/2658

1/6/01 Insurance Physician

DKV/2561

3/12/10 General practitioner - Brussels

Order/15862 1/1/99 Medical Doctor Order/01586 valid Role Cert_ID/issuer g f e d c b g f e d c g f e d c b g f e d c

Warning: you can be held liable for inappropriate use of certificates according to law with reference xx

CANCEL ACCEPT

(16)

Legislative Framework

♦ Social Security Royal Decree (16 Oct 1998)

♦ European Directive 1999/93/EC on a Community

Framework for electronic signatures

♦ Belgian Bill on the operation of certification

service providers for the application of electronic signatures (Belgian Chamber of Representatives, Doc 050322/001)

(17)

European Directive

Electronic signature means data in electronic form which are attached to or logically associated with other electronic data and which serve as a method of authentication

Advanced electronic signature:

• Uniquely linked to signatory

• capable of identifying the signatory

• Created using means the the signatory can maintain under his sole control

• Linked to the data so that any subsequent change of data is detectable

(18)

Directive (continued)

♦ No creation of certificates without the

knowledge of the holder

♦ Accreditation for certificate service providers is

volontary

♦ Uses the term‘electronic signature’ and not

‘digital signature’ -> technology independent

♦ Member states must comply before 19th July

(19)

Belgian el. Signature legislation

Bill (Wetsontwerp, Project de Loi) for

certification (el. Signature)

DOC 500322/001 (16.12.99)

♦ http://www.dekamer.be/documents/322/1.pdf

Bill for acceptance of el. Sign for Justice

Dept. (21.6.2000, Doc 5000038/007)

(20)

Belgian Signature initatives:other

Agora Project

– Federal project

– Public administrations (Finance, economic affairs, X-road databank, national statistics institute, national register, …)

– Agreements on technical aspects

– Distinction: personal ID and mandate

Royal decree 12.3.2000: modernisation of

public administration

Referenties

GERELATEERDE DOCUMENTEN

Sequentially, to determine to what extent the airline industry actually suffers after an air crash, the following research question has been determined: “How do

The analysis of the three selected cases in this study, where the host country ethical prescriptions were exerted by local governments, has shown, that in the long term

pakketmaatregel 'dode hoek'. We merken op dat we in dit rapport nog geen schatting geven van het aantal in 2020 bespaarde doden per maatregel. De reden daarvoor is dat de

Zo nodig wordt het SPV bijgesteld in het Bestuurlijk Koepeloverleg (voorheen Nationaal Mobiliteitsberaad, NMB). Dit rapport dient als hulpmiddel bij deze toets. Het behandelt

In het Nationaal Mobiliteitsberaad (NMB, dit heet inmiddels Bestuurlijk Koepeloverleg) is afgesproken om het plan iedere vier jaar te toetsen op actualiteit en indien nodig bij

The Swifterbant tradition covers only a modest section of the vast North European Plain, where simi- lar developments from a-ceramic foraging societies to

The misclassification loss L mis (u) is shown by solid lines and some loss functions used for classification are displayed by dashed lines: (a) the hinge loss and the 2-norm loss

The misclassification loss L mis (u) is shown by solid lines and some loss functions used for classification are displayed by dashed lines: (a) the hinge loss and the 2-norm loss