Electronic identification and trust services (including e-signature)

Available (29)

Showing 1 - 12 per page



Kira C. Lemke

Description of Activities

In the framework of this fellowship, I worked on a Technical Report (TR) that addresses critical gaps and challenges in the international standards landscape for digital content identification and binding mechanisms.
The absence of a common terminology across standardisation communities poses a major challenge. Different communities use inconsistent language when describing how content is connected with its metadata or other associated information. Whereas the C2PA initiative uses its own distinct terminology, other standardisation communities (e.g. W3C or OAIS) have different interpretations of what bindings mean. This terminological divergence leads to interoperability and mutual understanding barriers. The TR is establishing a comprehensive taxonomy that provides a neutral reference framework for multiple standardisation efforts, facilitating clearer communication across standardisation communities.
A gap the TR is addressing, is the limited comprehension of how binding mechanisms respond to content transformations. Digital content undergoes frequent alterations through compression, format conversion, and editing. Traditional identifier systems often fail when these changes occur, particularly when embedded metadata is stripped. The Working Group systematically analyses characteristics and limitations of different binding approaches, from cryptographic hashing to robust fingerprinting to watermarking techniques. This analysis will help stakeholders to make informed architectural decisions tailored to their specific requirements.
Moreover, the fellowship further contributes to positioning the recently published ISCC standard (ISO 24138:2024) within a broader global context. The TR serves as an educational resource, helping stakeholders understand how similarity-preserving identification methods complement established identification systems and address emerging needs in content provenance and authenticity verification, particularly relevant with current growth of AI-generated content.
 

Country
Germany
Impact on SMEs (9th Open Call)
The TR will guide SMEs in understanding binding mechanisms: structural (metadata embedding), semantic (descriptive relationships), algorithmic (hashes, content-derived identifiers), and resolvable (URLs, DOIs).
In terms of applications, an Italian start-up, amlet.ai, adopted ISCC (one algorithmic binding approach examined in the TR) for their TDM registry. Also, Dutch liccium.com implements ISCC for decentralized content registration and rights management. Estonian valunode.com uses ISCC in their decentralised content management solutions. These implementations exemplify relevance across AI/TDM, rights management, and digital content workflows.
In terms of Impact, the TR clarifies how embedding, watermarking, fingerprinting, and cryptographic approaches differ in robustness and workflow requirements, helping SMEs make informed decisions and build expertise. Content-derived methods computing identifiers locally enable GDPR-compliant implementations without centralised tracking, supporting digital sovereignty.
Impact on society (9th Open Call)
I can see several societal impacts for this work, including:
Digital Trust and Information Integrity: The TR systematically documents capabilities and limitations of different content binding mechanisms and enables an informed selection of appropriate trust mechanisms, critical for democratic processes and media trust in the AI era.
Data Sovereignty and Privacy: The analysis of decentralised identification methods directly supports European digital sovereignty principles and GDPR compliance. By documenting alternatives to centralised tracking, the work enables implementations where rightsholders maintain control over digital assets while supporting privacy-by-design standards, addressing fundamental European values around data protection.
Open Call
Organisation type
Organization
Craft AG
Portrait Picture
Kira C. Lemke
Proposal Title (9th Open Call)
ISCC and other methods for binding in information identification
Role in SDO
Standards Development Organisation
StandICT.eu Year
2026

Paolo Campegiani

Country
Italy
Impact on SMEs (8th Open Call)
Europe is developing its decentralized identity system (European Digital Identity Wallet - EUDIW). Many companies and citizens in Europe will adopt EUDIW; therefore, a standard that supports interoperability will facilitate the use of credentials, stored in the wallet, outside of Europe.
Open Call
Organization
Bit4id
Portrait Picture
Paolo Campegiani
Proposal Title (8th Open Call)
ISO 23042 - Decentralised identity management
Standards Development Organisation

Cloud computing – Trusted inter-cloud computing framework and requirements

Recommendation ITU-T Y.3514 specifies a framework of trusted inter-cloud computing and relevant use cases. It provides general requirements for trusted inter-cloud and specific ones related to governance, management, resiliency, security and confidentiality of trusted inter-cloud.

Network Functions Virtualisation (NFV) Release 3; Security; System architecture specification for execution of sensitive NFV components

Trust, as defined in ETSI GR NFV-SEC 003, is an important component of security. One weakness of software as opposed to hardware, is that software can be copied in whole or in part. Trust that is rooted in software may be less reliable than trust rooted in hardware, quickly, easily, and any number of times. For the particular case of sensitive workloads that have to be trusted, only the highest assurance in the root of trust is considered acceptable, thus for the purposes of the present document the root of trust shall be provided in hardware.

OASIS Cyber Threat Intelligence (CTI) TC

The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of information representations and protocols to address the need to model, analyze, and share cyber threat intelligence. In the initial phase of TC work, three specifications will be transitioned from the US Department of Homeland Security (DHS) for development and standardization under the OASIS open standards process: STIX (Structured Threat Information Expression), TAXII (Trusted Automated Exchange of Indicator Information), and CybOX (Cyber Observable Expression).

ISO/IEC JTC 1/SC 27 9798-2:2008 Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms

This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require a trusted third party for the establishment of a common secret key, and realize mutual or unilateral entity authentication.

ETSI TC CYBER

TC CYBER is recognized as a major trusted centre of expertise offering market-driven cyber security standardization solutions, advice and guidance to users, manufacturers, network, infrastructure and service operators and regulators. ETSI TC CYBER works closely with stakeholders to develop standards that increase privacy and security for organizations and citizens across Europe and worldwide. We provide standards that are applicable across different domains, for the security of infrastructures, devices, services, protocols, and to create security tools and techniques.

Security Assertion Markup Language (SAML 2.0)

SAML is an XML-based framework for exchanging security information. This security information is expressed in the form of assertions about subjects, where a subject is an entity (either human or computer) that has an identity in some security domain. A single assertion might contain several different internal statements about authentication, authorization and attributes. This Recommendation defines a protocol by which clients can request assertions from SAML authorities and get a response from them. This protocol, consisting of XML-based request and response message formats, can be bound to many different underlying communications and transport protocols; SAML currently defines one binding to SOAP over HTTP. In creating their responses, SAML authorities can use various sources of information, such as external policy stores and assertions that were received as input in requests. This Recommendation defines SAML assertions elements, subjects, conditions, processing rules and statements. Additionally, it develops a comprehensive SAML metadata profile that includes associated namespace, common data types, processing rules and signature processing. Several protocol bindings such as SOAP, PAOS (reverse SOAP), HTTP redirect, HTTP POST, among others, are also developed. This Recommendation provides a comprehensive list of SAML profiles such as web browser SSO profile and single logout profile to enable the wide adoption of SAML 2.0 in the industry. Guidelines for authentication context and conformance are also provided.This Recommendation is technically equivalent and compatible with the OASIS SAML 2.0 standard.

ITU-T X.1141