and to guarantee that no data are lost in case of system
errors or crashes.
O.25 CA QCert: The CA creates certificates according to
the given legal requirements.
O.26 SVD Auth CA: The CA verifies the integrity of the
obtained public key (SVD), checks the origin of the
public key, and verifies the relation between public key
and private key.
O.27 CA Auth: The CA must authenticate at the SuE.
Furthermore, the SuE and the CA must communicate
over an authenticated and secure channel.
O.28 VAD Auth: The OTP Gateway must be able to prove
its trustworthiness.
O.29 VAD Secure: The SuE and the OTP Gateway must
communicate over an authenticated and secure channel.
O.30 User Trusted: The Signatory must assure that the
used end-user system is trustworthy and free from mal-
ware and other sources of interference.
O.31 User Secure: The Signatory must assure that her
communication with the SuE relies on a secure and
trustworthy channel.
O.32 Avail: Technical and organizational means must be in
place to assure the availability of external components.
By meeting the derived security objectives, which
finally represents the developed evaluation model,
server-based signature solutions are able to counter all
identified threats and meet all made assumptions and
defined policies. Each security objective covers one
or multiple threats, assumptions, or policies. The con-
crete mapping between security objectives, threats,
assumptions, and policies is provided in Table 2.
6 CONCLUSIONS
In this paper we have proposed an evaluation model
for the systematic assessment of arbitrary server-
based signature solutions. The proposed model ba-
sically defines a set of implementation-independent
security objectives. Security objectives have been
derived following an elaborate methodology aligned
upon the approved concept of Common Criteria. The
security of a concrete server-based signature solution
can be assessed with the help of the proposed evalu-
ation model by determining its capability to meet the
set of defined security objectives.
Application of the proposed evaluation model to
existing server-based signature solutions is regarded
as future work and will kill two birds with one stone.
First, the soundness of the proposed evaluation model
will be evaluated. Second, existing server-based sig-
nature solutions will be systematically assessed in
order to identify potential security vulnerabilities.
By providing a universal evaluation model for arbi-
trary implementations, the proposed evaluation model
helps to assess and assure the security of future server-
based signature solutions. This facilitates a future
adoption of server-based signature solutions also in
security-critical fields of application and paves the
way for secure and usable online services based on
electronic signatures.
REFERENCES
A-Trust (2010). Activate mobile phone signature.
http://www.buergerkarte.at/en/activate-mobile.html.
Bicakci, K. and Baykal, N. (2003). Saots: A new efficient
server assisted signature scheme for pervasive com-
puting. In Hutter, D., Mller, G., Stephan, W., and
Ullmann, M., editors, SPC, volume 2802 of Lecture
Notes in Computer Science, pages 187–200. Springer.
Bicakci, K. and Baykal, N. (2005). Improved server assisted
signatures. Computer Networks, 47(3):351–366.
CEN/ISSS (2001). Protection profile - se-
cure signature creation device type 3.
http://wwww.commoncriteriaportal.org/files/pp
files/pp0006b.pdf.
Common Criteria (2013). Common criteria.
http://www.commoncriteriaportal.org/.
Ding, X., Mazzocchi, D., and Tsudik, G. (2002). Experi-
menting with server-aided signatures. In NDSS. The
Internet Society.
European Committee for Standardization (2013). Se-
curity requirements for trustworthy systems
supporting server signing. https://shop.austrian-
standards.at/Preview.action?preview=&dokkey=478405.
European Council (2004). Multidisciplinary ad hoc group
of specialists on legal, operational and technical stan-
dards for e-enabled voting (ip1-s-ee) b. explanat.
European Union (1999). Directive 1999/93/ec of the eu-
ropean parliament and of the council of 13 december
1999 on a community framework for electronic signa-
tures.
European Union (2012). Proposal for a regulation of the
european parliament and of the council on electronic
identification and trust services for electronic transac-
tions in the internal market.
Forum of European Supervisory Authorities for Electronic
Signatures (2005). Public statement on server based
signature services. http://www.fesa.eu/public-
documents/PublicStatement-
ServerBasedSignatureServices-20051027.pdf.
Orthacker, C., Centner, M., and Kittl, C. (2010). Qualified
mobile server signature. In Proceedings of the 25th
TC 11 International Information Security Conference.
Zefferer, T. and Krnjic, V. (2012). Usability evaluation
of electronic signature based e-government solutions.
In Proceedings of the IADIS International Conference
WWW/INTERNET 2012, pages 227 – 234.
AnImplementation-independentEvaluationModelforServer-basedSignatureSolutions
309