Abstract
In this paper we describe new secure personalization schemes using proxy cryptography. We first introduce the context of a large scale smart card application such as an electronic purse, the current personalization schemes and the security requirements. We recall the notion of proxy cryptography and we consider an actual proxy cryptosystem based on ElGamal public key encryption. With this proxy cryptosystem we setup new security schemes for smart cards personalization and we show that they are more secure, flexible and cheap than existing ones.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)
Blaze, M., Strauss, M.: Atomic proxy cryptography. TR 98.5.1, AT&T Labs–Research, February 23 (1998), http://www.research.att.com/library/trs
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in Cryptology: Proceedings of CRYPTO 1984, pp. 10–18. Springer, Heidelberg (1985)
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31(4), 469–472 (1985)
Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-hashing for message authentication. Internet Engineering Task Force, Request for Comments 2104 (February 1997)
Mambo, M., Okamoto, E.: Proxy cryptosystem: Delegation of the power to decrypt ciphertexts. IEICE Transactions on Fundamentals E80–A(1), 54–63 (1997)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Transactions on Fundamentals E79–A(9), 1338–1354 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Girard, P. (2000). Secure Personalization Using Proxy Cryptography. In: Quisquater, JJ., Schneier, B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10721064_30
Download citation
DOI: https://doi.org/10.1007/10721064_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67923-3
Online ISBN: 978-3-540-44534-0
eBook Packages: Springer Book Archive