Attribute-based signatures and eIDAS 2.0

Authors

DOI:

https://doi.org/10.71265/0kjh4e70

Keywords:

Digital authentication, eIDAS 2.0, electronic signatures, European Digital Identity Wallets, attributes, GDPR, digital identities, trust services, attribute-based authentication, attribute-based signatures

Abstract

Digital authentication and electronic signatures are essential for reliable digital verification of identities in the digital environment. With the introduction of European Digital Identity Wallets under eIDAS 2.0, there has been a shift in the use of trust services. In this contribution, I examine whether eIDAS 2.0 facilitate the use of privacy-friendly trust services, in particular attribute-based authentication (ABA) and attribute-based signatures (ABS). ABA and ABS provide benefits such as modular identity and role-based signing, offering greater flexibility compared to traditional trust services. The analysis shows the difference between authentication and signing, revealing that eIDAS 2.0 only facilitates attribute-based authentication through the European wallets, but not yet attribute-based signatures. The article concludes by discussing the remaining legal challenges that may impede the full realization of privacy-friendly trust services.

Downloads

Download data is not yet available.

Author Biography

  • Yong Yong Hu, Radboud University Nijmegen

    Yong Yong Hu is a PhD candidate at the Radboud Business Law Institute of Radboud University, the Netherlands.

References

Alpár G and Jacobs BPF, ‘Credential Design in Attribute-Based Identity Management’ in Ronald Leenes (ed), Bridging distances in technology and regulation (3rd TILTing Perspectives Conference 2013) 189-204

Ansaroudi Z and others, ‘Control Is Nothing Without Trust: A First Look into Digital Identity Wallet Trends’ (2023) 114 International Federation for Information Processing 117-120

Baum C and others, ‘Cryptographers’ feedback on the EU Digital Identity’s ARF’ [2024] 4-5, https://www.mayrhofer.eu.org/publication/eudiw-cryptographers-statement-2024/

Bertino E and Takahashi K, Identity Management: Concepts, Technologies, and Systems (Artech House 2011) 22

European Commission, Report from the Commission to the European Parliament and the Council on the Evaluation of Regulation (EU) No 910/2014 on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market, COM(2021) 290 final, SEC(20201) 229 final [2021] 5-7.

European Commission, European Digital Identity, https://commission.europa.eu/strategy-and-policy/priorities-2019-2024/europe-fit-digital-age/european-digital-identity_en.

Hampiholi B and others, ‘Towards practical attribute-based signatures’ in Chakraborty RS and others (eds), Security, Privacy, and Applied Cryptography Engineering (Springer 2015) 310-328

Hu WY, ‘Juridische eisen aan de betrouwbaarheid van digitale toestemming in de AVG’ [2022] Computerrecht 86-96

Hu WY and others, ‘Attribuut-gebaseerde elektronische handtekeningen en de eIDAS-verordening’ in Wolters PTJ and Hermans RM (eds), Digitalisering en conflictoplossing, Serie Onderneming en Recht (Wolters Kluwer 2021) 308–309

Inza J, ‘The European Digital Identity Wallet as Defined in the eIDAS 2 Regulation’ in Pastor Sempere C (ed), Governance and Control of Data and Digital Economy in the European Single Market (Law, Governance and Technology Series, Springer 2025) 439-442

Jacobs B, ‘The authenticity crisis’, (2024) 53 Computer Law & Security Review 105962

Kaafarani AE and others, ‘Attribute-based signatures with user-controlled linkability’ in Gritzalis D and others (eds), Cryptology and Network Security (Springer 2014), 256-269

Kurmi J and Sodhi A, ‘A survey of zero-knowledge proof for authentication’ (2015) 5 IJARCSSE 494-495; Adwait Pathak and others, ‘Secure authentication using zero knowledge proof’ [2021] Asian Conference on Innovation in Technology (ASIANCON), 1-8

Maji HK and others, ‘Attribute-based signatures’ in Kiayias A and others (eds) Topics in cryptology (Springer 2011) 376-392

Maji HK and others, ‘Attribute-based signatures: Achieving attribute-privacy and collusion-resistance’ (2008) IACR Cryptology ePrint Archive 328

Mohamed KS, ‘Cryptography Concepts: Integrity, Authentication, Availability, Access Control, and Non-repudiation’ in Mohamed KS (ed) New Frontiers in Cryptography, (Springer 2020) 41-63

Okamoto T and Takashima K, ‘Decentralized attribute-based signatures’, in Kaoru Kurosawa (eds), Public-Key Cryptography – PKC 2013, Lecture Notes in Computer Science 7778 (Springer 2013) 125-142

Podgorelec B and others, ‘What Is a (Digital) Identity Wallet? A Systematic Literature Review’ [2022] Proceedings of the IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 814-816

Downloads

Published

30-03-2026

Issue

Section

Special issue: security in the digital age

Categories

How to Cite

Hu, Y. Y. (2026). Attribute-based signatures and eIDAS 2.0. Technology and Regulation, 2026, 44-56. https://doi.org/10.71265/0kjh4e70

Similar Articles

1-10 of 76

You may also start an advanced similarity search for this article.