TryTRY
BuyBUY
  • newsletter
  • contact
  • corporate
  • careers
Utimaco
TRYour free HSM simulator
BUYget a quote
  • home
  • solutions
  • products
  • services
  • blog
  • downloads
  • partners
  • company

Utimaco Portal

Here you will find everything you need as a partner and customerLogin required

  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research
  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research

Home / Blogs / Auditing blockchain and eIDAS

Auditing blockchain and eIDAS

November 09, 2020

The anonymity provided by some blockchains is one of the largest attractions about this technology. For business adoption though identity on and off the chain is crucial, legally and logistically. On an entirely distributed, decentralized blockchain such as Bitcoin or Ethereum, this anonymity serves a purpose and encourages individual use. For business adoption however it poses problems.

eIDAS are EU regulations for member states to accept legally binding electronic signatures and identities. They ease cross boarder transactions in multiple industries, including finance, health care, and logistics. In this article we’ll be looking at the need for identity on blockchains in business adoption, and explore how eIDAS could help meet that need.

Why do we need identity on blockchain?

Auditing businesses is how it is verified that they are meeting regulations to ensure company integrity and the security of customers’ sensitive data. While auditing blockchains is certainly doable, the lack of identity is a barrier. Public and private keys are used extensively on blockchains, but there is no inherent linkage between them and any legally identifying information. This makes auditing difficult and can facilitate illegal activity. For example, the 2016 DAO hacker’s public address is known, but that address isn’t linked to anything that could identify him/her/them. In order for blockchain to be more business friendly, there needs to be a way to manage identities on the chain, and link them to other identifying information for multiple reasons, including auditability.

How could eIDAS help?

The EU eIDAS regulations are legally binding and allow for the use of electronic signatures across boarders in the internal EU market. They provide authentication, ensure integrity, and ease usage by removing the need for physical handwritten signatures. Processes such as voting, taxes, and opening bank accounts can all be done easily and virtually using digital signatures.

New call-to-actionPhysical signatures are also less secure than digital signatures. Generally you have to use the same handwritten signature for every type of document, from signing a contract to a marriage license. This means that the one, handwritten signature can be taken from nearly anywhere and easily replicated. It is also the same no matter what the document’s content is, so someone with your signature could change the contents of what you signed, and there is no way of proving that documents with a physical signature haven’t been altered.

Blockchain already has digital signatures and encryption built in, so merging this technology with eIDAS to ease business adoption across the EU is only a natural process. Under eIDAS advanced electronic signatures have several requirements. These include a private key controlled only by the signatory being used to create a signature, data integrity being verifiable with the signature (if the data has been changed the signature will not be the same), and others.

Blockchain’s digital signature features and cryptography are extensive, so it would not be difficult for it to work with eIDAS.

Conclusion

Auditing blockchains is necessary for large scale business adoption, but it has many difficulties, and ensuring identity of individuals on chain is a major one. Integrating blockchain with eIDAS could put us one step closer to wider use of this emerging technology across the EU. The fact that this regulation is already implemented is an excellent opportunity to integrate a juvenile technology with an existing regulation and propel businesses into the future.

This series tries to shed light on important security related aspects of blockchains and discusses some of the currently emerging loopholes. The first article looks at expected developments in the blockchain technology during the next 10 years. In the 2nd article we argue why blockchains will need to be auditable for successful business adoption. This 3rd article discusses how the digital signature regulation eIDAS can help making blockchains auditable.

New call-to-action

Back to overview

Stay on top of our news
Don’t miss out on any Utimaco updates

Subscribe to Utimaco Newsletter

We will keep you posted with news from Utimaco and the industries we protect, as well as information on upcoming events and webinars.

Subscribe now

Partners

Abrantix AG Compumatica secure networks GmbH Compumatica secure networks B.V. Fortiedge Pte Ltd. Skytech Computing Solutions Limited. - Utimaco Hardware Security Modules Partner Encryption Consulting LLC MTG - Utimaco Hardware Security Modules Partner Utimaco HSM - QuintessenceLabs E-Sign S.A. Nexus - Utimaco Hardware Security Modules Partner Utimaco HSM - InfoGuard Swiss Cyber Security CertiSur S.A. Ascertia - Utimaco Hardware Security Modules Partner Clearkey Consulting - Utimaco Hardware Security Modules Partner VAR Group SpA - Utimaco Hardware Security Modules Partner Softline Solutions GmbH Astel (UK) Ltd. - Utimaco Hardware Security Modules Partner MIcrosec Safesoft Kft. Synergy Computers (Pvt.) Ltd. - Utimaco Hardware Security Modules Partner Real security d.o.o. Utimaco HSM - PTESA_profesionales en transacciones electronicas CEGA Security Cryptomathic Inc. Komar Consulting Inc. - Utimaco Hardware Security Modules Partner Secure Source Distribution (M) Sdn Bhd - Utimaco Hardware Security Modules Partner Envoy Data Corporation - Utimaco Hardware Security Modules Partner Cryptomathic GmbH Versasec EUROPEAN DYNAMICS SA. intarsys AG PKI Solutions Inc. Altacom UAB Baas Control s.r.o. Nexus - Utimaco Hardware Security Modules Partner SecureMetric Technology Sdn. Bhd. Telegrupp AS JJNet International Co., Limited - Utimaco Hardware Security Modules Partner IQuantics Corp Perceptus-sp.-z-o.-o. Fornetix - Utimaco Hardware Security Modules Partner cv cryptovision GmbH CewTec S.A. ESYSCO Sp. z o.o. Microexpert Limited Macroseguridad PETA (Thailand) Co., Ltd. CREAplus Italia S.r.l Rohde & Schwarz Cybersecurity GmbH Primekey Solutions AB MALKOM D.Malińska i Wspólnicy s.j. Nexus Technology GmbH Throughwave (Thailand) Co.,Ltd - Utimaco Hardware Security Modules Partner Cyber Armor Pte Ltd Cogito Group Pty Ltd AKEA S.A. - Utimaco Hardware Security Modules Partner PrimeKey Labs GmbH Thomas-Krenn.AG Cryptomathic A/S CREA plus d.o.o.
Find a partner

Share this page

EMEA

Utimaco IS GmbH
Germanusstraße 4
52080 Aachen
Germany
Phone: + 49 241 1696 200

Americas

Utimaco Inc.
900 E Hamilton Ave., Suite 400
Campbell, CA 95008
USA
Phone: +1 844 UTIMACO

APAC

Utimaco IS Pte Limited
80 Raffles Place,
#32-01, UOB Plaza
Singapore 048624
Phone: +65 6622 5347

Utimaco

  • support
  • corporate
  • careers
  • legal
  • terms & conditions
  • privacy
  • cookie-policy
© 2021
to top
  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research