%0 Conference Proceedings %T Securing Transactions with the eIDAS Protocols %+ Bundesdruckerei GmbH %+ Technische Universität Darmstadt - Technical University of Darmstadt (TU Darmstadt) %A Morgner, Frank %A Bastian, Paul %A Fischlin, Marc %Z Part 1: Authentication and Key Management %< avec comité de lecture %( Lecture Notes in Computer Science %B 10th IFIP International Conference on Information Security Theory and Practice (WISTP) %C Heraklion, Greece %Y Sara Foresti %Y Javier Lopez %I Springer International Publishing %3 Information Security Theory and Practice %V LNCS-9895 %P 3-18 %8 2016-09-26 %D 2016 %R 10.1007/978-3-319-45931-8_1 %Z Computer Science [cs]Conference papers %X The proposed European system for electronic identities, authentication, and trust services (eIDAS) enables remote authentication of an identity card (and selected data of the card) to an eID service. The core system has already been running on the German identity card since 2010. We analyze an extension proposed by Bundesdruckerei that enables the protocol to authenticate further transaction data such as phone numbers or PGP keys. In particular we prove cryptographically that the extension provides strong authenticity guarantees. We also discuss privacy aspects of the solution, preventing the card and the service provider of the eIDAS system to learn the actual transaction data. %G English %Z TC 11 %Z WG 11.2 %2 https://inria.hal.science/hal-01639614/document %2 https://inria.hal.science/hal-01639614/file/421627_1_En_1_Chapter.pdf %L hal-01639614 %U https://inria.hal.science/hal-01639614 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-9895