Attribute-based signatures and eIDAS 2.0
DOI:
https://doi.org/10.71265/0kjh4e70Keywords:
Digital authentication, eIDAS 2.0, electronic signatures, European Digital Identity Wallets, attributes, GDPR, digital identities, trust services, attribute-based authentication, attribute-based signaturesAbstract
Digital authentication and electronic signatures are essential for reliable digital verification of identities in the digital environment. With the introduction of European Digital Identity Wallets under eIDAS 2.0, there has been a shift in the use of trust services. In this contribution, I examine whether eIDAS 2.0 facilitate the use of privacy-friendly trust services, in particular attribute-based authentication (ABA) and attribute-based signatures (ABS). ABA and ABS provide benefits such as modular identity and role-based signing, offering greater flexibility compared to traditional trust services. The analysis shows the difference between authentication and signing, revealing that eIDAS 2.0 only facilitates attribute-based authentication through the European wallets, but not yet attribute-based signatures. The article concludes by discussing the remaining legal challenges that may impede the full realization of privacy-friendly trust services.
Downloads
References
Alpár G and Jacobs BPF, ‘Credential Design in Attribute-Based Identity Management’ in Ronald Leenes (ed), Bridging distances in technology and regulation (3rd TILTing Perspectives Conference 2013) 189-204
Ansaroudi Z and others, ‘Control Is Nothing Without Trust: A First Look into Digital Identity Wallet Trends’ (2023) 114 International Federation for Information Processing 117-120
Baum C and others, ‘Cryptographers’ feedback on the EU Digital Identity’s ARF’ [2024] 4-5, https://www.mayrhofer.eu.org/publication/eudiw-cryptographers-statement-2024/
Bertino E and Takahashi K, Identity Management: Concepts, Technologies, and Systems (Artech House 2011) 22
European Commission, Report from the Commission to the European Parliament and the Council on the Evaluation of Regulation (EU) No 910/2014 on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market, COM(2021) 290 final, SEC(20201) 229 final [2021] 5-7.
European Commission, European Digital Identity, https://commission.europa.eu/strategy-and-policy/priorities-2019-2024/europe-fit-digital-age/european-digital-identity_en.
Hampiholi B and others, ‘Towards practical attribute-based signatures’ in Chakraborty RS and others (eds), Security, Privacy, and Applied Cryptography Engineering (Springer 2015) 310-328
Hu WY, ‘Juridische eisen aan de betrouwbaarheid van digitale toestemming in de AVG’ [2022] Computerrecht 86-96
Hu WY and others, ‘Attribuut-gebaseerde elektronische handtekeningen en de eIDAS-verordening’ in Wolters PTJ and Hermans RM (eds), Digitalisering en conflictoplossing, Serie Onderneming en Recht (Wolters Kluwer 2021) 308–309
Inza J, ‘The European Digital Identity Wallet as Defined in the eIDAS 2 Regulation’ in Pastor Sempere C (ed), Governance and Control of Data and Digital Economy in the European Single Market (Law, Governance and Technology Series, Springer 2025) 439-442
Jacobs B, ‘The authenticity crisis’, (2024) 53 Computer Law & Security Review 105962
Kaafarani AE and others, ‘Attribute-based signatures with user-controlled linkability’ in Gritzalis D and others (eds), Cryptology and Network Security (Springer 2014), 256-269
Kurmi J and Sodhi A, ‘A survey of zero-knowledge proof for authentication’ (2015) 5 IJARCSSE 494-495; Adwait Pathak and others, ‘Secure authentication using zero knowledge proof’ [2021] Asian Conference on Innovation in Technology (ASIANCON), 1-8
Maji HK and others, ‘Attribute-based signatures’ in Kiayias A and others (eds) Topics in cryptology (Springer 2011) 376-392
Maji HK and others, ‘Attribute-based signatures: Achieving attribute-privacy and collusion-resistance’ (2008) IACR Cryptology ePrint Archive 328
Mohamed KS, ‘Cryptography Concepts: Integrity, Authentication, Availability, Access Control, and Non-repudiation’ in Mohamed KS (ed) New Frontiers in Cryptography, (Springer 2020) 41-63
Okamoto T and Takashima K, ‘Decentralized attribute-based signatures’, in Kaoru Kurosawa (eds), Public-Key Cryptography – PKC 2013, Lecture Notes in Computer Science 7778 (Springer 2013) 125-142
Podgorelec B and others, ‘What Is a (Digital) Identity Wallet? A Systematic Literature Review’ [2022] Proceedings of the IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 814-816
Downloads
Published
License
Copyright (c) 2026 Yong Yong Hu

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
