2 OVERVIEW OF EACH
COUNTRY’S TRUST SERVICES
Countries have developed an infrastructure called
trust services for the creation, verification, and
validation of electronic signatures, electronic seals
or time stamps, and their associated certificates
(EUR-Lex, 2014), as a mechanism to prevent digital
data from being tampered with or spoofed. This
chapter describes the status of trust services in each
country as shown in Table 1.
Table 1: Country comparison of trust services.
Items EU UK US JP
Legal eIDAS
UK
eIDAS
FICAM
program
Electronic
Signature
Act
Trust service
representation
Trusted List Bridge
2.1 European Union
In 1999, a Directive of the European Parliament on a
Community framework for electronic signatures was
enacted. According to this Directive, an electronic
signature is considered equivalent to a handwritten
signature. The eIDAS Regulation (EUR-Lex, 2014)
is a groundbreaking direct law that ensures a certain
level of trust in the data in circulation to allow
for secure electronic transactions across different
countries within the EU. The eIDAS Regulation has
been enforced since 2016 and it gives legal effect to
trust services.
Article 3 of the regulation provides a definition of
trust services which shows digital signature, e-seal
and timestamp etc. Furthermore, it is stated that
each trust service “shall not be denied legal effect or
admissibility as evidence in legal proceedings solely
because it is in electronic form” (EUR-Lex, 2014).
The regulation specifies that a National
Supervisory Body (Supervisory Body) is to
be established in each EU member state and a
Conformity Assessment Body is to be designated
to assess the conformity of Qualified Trust Service
Providers.
It stipulates that a Trusted List (TL) of qualified
trust service providers and services be compiled for
each member state, managed and published in a
uniform format, and that the information in the list
be machine-readable with an electronic signature or
e-seal. It also stipulates that the EU will make these
national lists publicly available.
As of November 2022, there are 222 qualified
trust service providers. A list of these Qualified
Trust Services is published in each of the EU
Member States in a machine-readable format called a
Trusted List (TL). In addition, a List of Trusted Lists
(LoTL) (eIDAS, 2022) links all Trusted Lists of the
EU member states.
2.2 United Kingdom
The UK eIDAS Regulation (ICO, 2022a) provides the
legal framework for the use of electronic trust services
offered within the UK and identifies equivalent
services offered in the EU. Electronic trust services
can be used in a number of ways to provide
security for electronic documents, communications
and transactions, e.g. to help ensure that documents
sent electronically have not been altered in any way
and that the sender can be easily authenticated.
Electronic trust services allow for such security
properties to be applied and then validated and thus
help ensure confidence in the electronic transfer of
information.
While being a member of EU, UK’s trust services
were listed on the UK TL (ICO, 2022b), which is
linked from the EU LoTL. After leaving the EU, UK
maintains its own UK TL according to UK eIDAS
1
.
2.3 United States
The United States (US) consider threats on its digital
information and communications infrastructure
as a significant security challenge. In order
for the federal government to address these
threats, the security control measures necessary
to prevent and detect unauthorized access to federal
information technology networks, systems, and
data are critical. The Federal Identity, Credential,
and Access Management (FICAM) (FICAM, 2022)
initiative is a means for addressing the nation’s
cybersecurity needs. FICAM’s recommendations
include increasing the authentication strength of
individuals and devices, using privacy-enhancing
technologies, and expanding the availability of
identity management capabilities to address cyber
threats.
If the functions of Identity, Credential, and
Access Management (ICAM) for each agency run
independently, users are forced to deal with multiple
incompatible credential, authentication, and access
control functions. In addition, each ICAM function
has a separate administrative interface used for
registration and authorization management, which
would result in redundancy and inefficiency if left to
1
https://tl.ico.org.uk/uktrustedlist/UKTL.xml
International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed â
˘
AIJHakoniwaâ
˘
A
˙
I
765