SSI Eidas Legal Report
Total Page:16
File Type:pdf, Size:1020Kb
SSI eIDAS Legal Report How eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market Dr. Ignacio Alamillo Domingo April – 2020 Blockchain / DLT Technologies EUROPEAN COMMISSION European Commission B-1049 Brussels 2020 SSI eIDAS Legal Report How eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market INTERNAL IDENTIFICATION Specific contracts 003604 and 003491 under Framework Contract DI/07445-00 (STIS IV) DISCLAIMER This document has been prepared for the European Commission, however, it reflects the views only of the authors, and the Commission cannot be held responsible for any use, which may be made of the information contained therein. The work was co-funded by the ISA2 programme, as part of the Innovative Public Services action, and the CEF Digital programme, in the context of the European Blockchain Services Infrastructure building block. The H2020 EU Project OLYMPUS, under Grant 786725, supported part of this work. The author is Dr. Ignacio Alamillo Domingo (Astrea La Infopista Jurídica), Lawyer, CISA, CISM, researcher at iDerTec (University of Murcia). More information on the European Union is available on the Internet (http://www.europa.eu). 2020 2020 SSI eIDAS Legal Report 1 Table of contents TABLE OF CONTENTS ................................................................................................................................... 1 TABLE OF FIGURES ...................................................................................................................................... 3 GLOSSARY OF TERMS AND ACRONYMS ...................................................................................................... 4 PART 1. AN INTRODUCTION TO SELF-SOVEREIGN IDENTITY ........................................................................ 8 1. THE TRANSFORMATION OF DIGITAL IDENTITY ................................................................................... 8 2. SELF-SOVEREIGN IDENTITY .............................................................................................................. 12 3. SSI AND TRUST GOVERNANCE ......................................................................................................... 21 PART 2. THE EIDAS REGULATION............................................................................................................... 23 4. THE LEGAL REGIME OF ELECTRONIC IDENTIFICATION MEANS FOR CROSS-BORDER TRANSACTIONS 25 4.1. LEGAL CONCEPT OF ELECTRONIC IDENTIFICATION (EID) .............................................................................. 26 4.2. THE SCOPE OF THE EIDAS REGULATION AND ITS RELATIONSHIP WITH NATIONAL LAW ....................................... 30 4.3. ELIGIBILITY CRITERIA FOR THE NOTIFICATION OF ELECTRONIC IDENTIFICATION SCHEMES ..................................... 33 4.4. THE LEGAL EFFECT OF NOTIFIED ELECTRONIC IDENTIFICATION MEANS ............................................................ 55 5. THE LEGAL REGIME OF ELECTRONIC SIGNATURES AND ELECTRONIC SEALS ..................................... 60 5.1. ELECTRONIC SIGNATURES AND SEALS ...................................................................................................... 60 5.2. ADVANCED ELECTRONIC SIGNATURES AND SEALS ....................................................................................... 63 5.3. QUALIFIED ELECTRONIC SIGNATURES AND SEALS ....................................................................................... 66 5.4. THE LEGAL EFFECT OF ELECTRONIC SIGNATURES AND SEALS ......................................................................... 71 6. THE LEGAL REGIME OF TRUST SERVICES .......................................................................................... 79 6.1. THE EIDAS CHARACTERISATION OF TRUST SERVICES................................................................................... 79 6.2. THE EIDAS REGULATORY MODEL FOR TRUST SERVICES ............................................................................... 84 6.3. ISSUANCE OF ELECTRONIC SIGNATURE/SEAL/WEBSITE DIGITAL CERTIFICATES ................................................... 86 PART 3. LEGAL SCENARIOS RELATED TO SSI & EIDAS................................................................................. 90 7. GENERAL LEGAL CONSIDERATIONS .................................................................................................. 91 7.1. REGARDING THE LEGAL VALUE OF VERIFIABLE CREDENTIALS AND THEIR PRESENTATIONS .................................... 91 7.2. LEGAL ASSESSMENT OF DIDS, DID DOCUMENTS AND DID CONTROL KEYS ..................................................... 93 8. LEGAL ASSESSMENT OF VERY SHORT-TERM SCENARIOS .................................................................. 95 8.1. USE OF NOTIFIED EIDAS EID MEANS AND QUALIFIED CERTIFICATES TO ISSUE VERIFIABLE CREDENTIALS ................. 95 8.2. EIDAS BRIDGE: INCREASING VERIFIABLE CREDENTIALS’ LEGAL VALUE AND CROSS-BORDER RECOGNITION ............101 8.3. USE CURRENT EID NODES TO ISSUE A SAML ASSERTION BASED IN VERIFIABLE CREDENTIALS/PRESENTATIONS .....104 9. LEGAL ASSESSMENT OF SHORT-TERM SCENARIOS ......................................................................... 106 9.1. USE OF VERIFIABLE IDS AS EIDAS ELECTRONIC IDENTIFICATION MEANS .......................................................106 9.2. ISSUANCE OF QUALIFIED CERTIFICATES BASED ON A SPECIFIC DID METHOD AND VERIFIABLE CREDENTIAL ............112 10. LEGAL ASSESSMENT OF MID- TO LONG-TERM SCENARIOS ............................................................. 118 10.1. EXTEND THE EIDAS NOTIFICATION MECHANISM TO VERIFIABLE ATTESTATIONS: ENHANCED TRUSTED ISSUERS MANAGEMENT ...............................................................................................................................................118 10.2. REGULATE THE ISSUANCE OF VERIFIABLE ATTESTATIONS AS A TRUST SERVICE ................................................124 10.3. REGULATE THE ACTIVITY OF IDENTITY HUBS AS A TRUST SERVICE, IN SUPPORT OF SSI-BASED ONCE ONLY PRINCIPLE 126 10.4. REGULATE DELEGATED KEY MANAGEMENT AS AN INDEPENDENT TRUST SERVICE, IN SUPPORT OF REMOTE WALLETS 130 10.5. REGULATE A SPECIFIC TYPE OF DLT NODE AS A TRUST SERVICE ...................................................................134 2 SSI eIDAS Legal Report REFERENCES ............................................................................................................................................ 138 SSI eIDAS Legal Report 3 Table of figures Figure 1. Relationships between DID, DID document and subject (Reed & Sabadello, 2020) ........................ 15 Figure 2. Verifiable Credentials and Presentations conceptual map (Alamillo Domingo, 2019b). .................. 16 Figure 3. Self-Sovereign Identity Management Model in Blockchain (Bernal Bernabé et al, 2019) ............... 17 Figure 4. Identity management methods evolution over time, according to privacy preservation capabilities (Bernal Bernabé et al, 2019) ................................................................................................................... 17 Figure 5. Proposed taxonomy of crypto-assets (Arslanian & Fischer, 2019) ................................................... 19 Figure 6. Use cases and actors for identity management (Kuperberg, 2019) ................................................... 20 Figure 7. Compliance and liability criteria (Kuperberg, 2019)......................................................................... 20 Figure 8. SSI trust relationship (Mühle et al, 2018) ......................................................................................... 21 Figure 9. Electronic identification conceptual map (Alamillo Domingo, 2016) .............................................. 29 Figure 10. Risk matrix considered in IDABC .................................................................................................. 38 Figure 11. The need to define common authentication assurance levels in STORK ........................................ 39 Figure 12. Relevant factors for QAA levels in STORK ................................................................................... 40 Figure 13. Authentication assurance levels mapping in STORK ..................................................................... 40 Figure 14. eIDAS Regulatory model conceptual map (Alamillo Domingo, 2019a)......................................... 85 Figure 15. Use current eID nodes to issue a SAML assertion based in verifiable credentials/presentations . 105 Figure 16. Use of Verifiable IDs as eIDAS electronic identification means .................................................. 107 Figure 17. Choose your Bitcoin Wallet. ......................................................................................................... 133 Figure 18. DLT System roles and sub-roles (ISO/CD 23257.3) ..................................................................... 135 Figure 19. System view of functional components of a DLT system (ISO/CD 23257.3) .............................. 136 4 SSI eIDAS Legal Report Glossary of terms and acronyms Authoritative Any source irrespective of its form that can be relied upon to source provide accurate data, information and/or evidence that can be used to prove identity (eIDAS Security Regulation). Consumer rights Directive 2011/83/EU of the European Parliament and of the Directive Council of 25 October 2011 on consumer rights, amending Council