Please enable JavaScript.
Coggle requires JavaScript to display documents.
Validation Report - Coggle Diagram
Validation Report
-
signature
-
-
types
-
-
-
AdES (digital) signature
digital signature that is either a CAdES signature, or a PAdES signature or a XAdES signature
digital signature:
data appended to, or a cryptographic transformation of a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g. by the recipient
digital signature value
result of the cryptographic transformation of a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g. by the recipient
signature acceptance:
technical verification to be performed on the signature itself or on the attributes of the signature (i.e. the "signature elements constraints")
signature augmentation:
process of incorporating to a digital signature information aiming to maintain the validity of that signature over the near term and/or the long term
Augmenting signatures is the process by which certain material (e.g. time stamps, validation data and even archival-related material) is incorporated to the signatures for making them more resilient to change or for enlarging their longevity.
This covers collection of information and creation of new structures that allows performing, on the long term, validations of a signature.
-
-
signature class
-
Signature with time, signature with long term validation material, Signature providing Long Term Availability and Integrity of Validation Material are possible signature classes
signature creation
signature creation data
unique data, such as codes or private cryptographic keys, which are used by the signer to create a digital signature value
-
-
-
-
signature invocation
non-trivial interaction between the signer and the SCA or SCDev that is necessary to invoke the start of the signing process. It is the 'Wilful Act' of the signer.
signature policy
signature creation policy, signature augmentation policy, signature validation policy or any combination thereof, applicable to the same signature or set of signatures
signature scheme
triplet of algorithms composed of a signature creation algorithm, a signature verification algorithm and a key generation algorithm
-
evidence
information that can be used to resolve a dispute about various aspects of authenticity of archived data objects
evidence record:
unit of data, which can be used to prove the existence of an archived data object or an archived data object group at a certain time
-
trust anchor
entity that is trusted by a relying party and used for validating certificates in certification paths
-
trusted list
list that provides information about the status and the status history of the trust services from trust service providers regarding compliance with the applicable requirements and the relevant provisions of the applicable legislation
In the context of European Union Member States, as specified in Regulation (EU) No 910/2014 [i.8], it refers to an EU Member State list including information related to the qualified trust service providers for which it is responsible, together with information related to the qualified trust services provided by them.
In the context of non-EU countries or international organizations, it refers to a list meeting the requirements of ETSI TS 119 612 [6] and providing assessment scheme based approval status information about trust services from trust service providers, for compliance with the relevant provisions of the applicable approval scheme and the relevant legislation
attribute
-
attribute certificate:
data structure, digitally signed by an attribute authority, that binds some attribute values with
identification information about its holder
CRL
-
signed list indicating a set of certificates that are no longer considered valid by the certificate issuer
certificate
chain model
model for validation of X.509 certificate chains where all CA certificates have to be valid at the time they were used for issuing a certificate and the end-entity certificate was valid when creating the signature
-
shell model
model for validation of X.509 certificate chains where all certificates have to be valid at a given time. The given time is an input parameter to the validation
signature verification
signature verification: process of checking the cryptographic value of a signature using signature verification data
-
signed data object
data structure containing the signature value, signature attributes and other information
-
-
-
-
signing time
claimed signing time
time of signing claimed by the signer which on its own does not
provide independent evidence of the actual signing time
-
driving application (DA)
application that uses a signature creation system to create a signature or a signature validation application in order to validate digital signatures or a signature augmentation application to augment digital signatures
electronic document:
any content stored in electronic form, in particular text or sound, visual or audiovisual recording
timestamp
data in electronic form which binds other electronic data to a particular time establishing evidence that these data existed at that time
Best-signature-time
is an internal variable for the algorithm denoting the earliest time when it can be trusted by the SVA (either because proven by some POE present in the signature or passed by the DA and for this reason assumed to be trusted) that a signature has existed.