{"id":"https://openalex.org/W6906788754","doi":"https://doi.org/10.18420/oid2024_13","title":"Qualified Electronic Signatures with the EU Digital Identity Wallet","display_name":"Qualified Electronic Signatures with the EU Digital Identity Wallet","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W6906788754","doi":"https://doi.org/10.18420/oid2024_13"},"language":"en","primary_location":{"id":"doi:10.18420/oid2024_13","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2024_13","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/oid2024_13","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Wich, Tobias","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wich, Tobias","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"H\u00fchnlein, Detlef","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"H\u00fchnlein, Detlef","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Otto, Florian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Otto, Florian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Prechtl, Mike","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Prechtl, Mike","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.55176013,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.260699987411499,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.260699987411499,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.1444000005722046,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.0754999965429306,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7883999943733215},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.661899983882904},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6140000224113464},{"id":"https://openalex.org/keywords/json","display_name":"JSON","score":0.5720999836921692},{"id":"https://openalex.org/keywords/electronic-signature","display_name":"Electronic signature","score":0.5268999934196472},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5012999773025513},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.44670000672340393},{"id":"https://openalex.org/keywords/digital-identity","display_name":"Digital identity","score":0.4440000057220459},{"id":"https://openalex.org/keywords/kerberos","display_name":"Kerberos","score":0.4375}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7883999943733215},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.661899983882904},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6557999849319458},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6518999934196472},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6140000224113464},{"id":"https://openalex.org/C2780416260","wikidata":"https://www.wikidata.org/wiki/Q2063","display_name":"JSON","level":2,"score":0.5720999836921692},{"id":"https://openalex.org/C196587545","wikidata":"https://www.wikidata.org/wiki/Q869548","display_name":"Electronic signature","level":3,"score":0.5268999934196472},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5012999773025513},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4481000006198883},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.44670000672340393},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.4440000057220459},{"id":"https://openalex.org/C32455479","wikidata":"https://www.wikidata.org/wiki/Q506053","display_name":"Kerberos","level":3,"score":0.4375},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.42489999532699585},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.37779998779296875},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3772999942302704},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.36629998683929443},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.34369999170303345},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.34220001101493835},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.33410000801086426},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.3125},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.2750000059604645},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.26840001344680786},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.25690001249313354},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.25609999895095825}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/oid2024_13","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2024_13","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/oid2024_13","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2024_13","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Art.":[0,37,60],"5a":[1,38,61],"of":[2,27,54,82,105,141,162,176],"the":[3,9,16,25,79,86,103,111,115,131,139,147,155,160,172,177,186,193],"amended":[4],"eIDAS-Regulation":[5],"(EU)":[6],"2024/1183":[7],"establishes":[8],"European":[10,17],"Digital":[11],"Identity":[12,19],"Framework":[13,125],"and":[14,34,41,65,110,123,144,146,165,206],"introduces":[15],"Digitial":[18],"Wallet":[20],"(EUDIW),":[21],"which":[22],"will":[23,71,133],"meet":[24],"requirements":[26],"assurance":[28],"level":[29],"\u201chigh\u201d":[30],"for":[31,56,138,208],"identity":[32],"proofing":[33],"authentication":[35,145],"(see":[36,59],"Nr.":[39,62,66],"11)":[40],"is":[42],"envisioned":[43],"to":[44,47,77,96,151,158,169,184,189],"be":[45,73,159],"able":[46],"create":[48],"Qualified":[49,89],"Electronic":[50],"Signatures":[51],"(QES)":[52],"free":[53],"charge":[55],"non-professional":[57],"purposes":[58],"4":[63],"(e)":[64],"5":[67],"(g)).":[68],"As":[69],"it":[70,128],"not":[72],"feasible":[74],"in":[75,85,154,192],"practice":[76],"certify":[78],"secure":[80],"elements":[81],"all":[83],"smartphones":[84],"market":[87],"as":[88,199],"Signature":[90,117],"Creation":[91],"Device":[92],"(QSCD),":[93],"one":[94],"needs":[95],"look":[97],"at":[98],"remote":[99,173],"signature":[100,174],"solutions":[101],"along":[102],"lines":[104],"ETSI":[106],"TS":[107],"119":[108],"432":[109],"specification":[112],"developed":[113],"within":[114],"Cloud":[116],"Consortium":[118],"(CSC)":[119],".":[120],"The":[121,179],"Architecture":[122],"Reference":[124],"(ARF)":[126],"makes":[127],"clear":[129],"that":[130],"EUDIW":[132,156,194],"support":[134],"Verifiable":[135,163,166,209],"Credentials":[136,164],"(VCs)":[137],"purpose":[140],"strong":[142],"identification":[143],"only":[148],"missing":[149],"step":[150],"enable":[152,190],"QES":[153,191],"seems":[157],"integration":[161],"Presentations":[167,210],"according":[168],"W3C":[170],"with":[171],"protocol":[175],"CSC-API.":[178],"present":[180],"paper":[181],"shows":[182],"how":[183],"integrate":[185],"two":[187],"worlds":[188],"using":[195],"emerging":[196],"standards,":[197],"such":[198],"Selective":[200],"Disclosure":[201],"JSON":[202],"Web":[203],"Tokens":[204],"(SD-JWT)":[205],"OpenID":[207],"(OID4VP).":[211]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
