10,319 Hits in 4.2 sec

Off-Line Group Signatures with Smart Cards [chapter]

Jean-Bernard Fischer, Emmanuel Prouff
2006 Lecture Notes in Computer Science  
Based on a re-assessment of the notion of group signature, we propose an improvement of the Canard-Girault scheme allowing to perform signature and verification both off-line.  ...  Among them, the simplest and most efficient has been proposed by Canard and Girault at Cardis 2002 and involves the smart card as security proxy.  ...  Off-line Group Signatures and Risk Management Let us assume that, from time to time, Alice's smart card verifies on-line with the group authority that it belongs to the group.  ... 
doi:10.1007/11733447_19 fatcat:kppjmq5i6rdhrg2iga4l32oofm

A Novel Protocol for Smart Card Using ECDLP

Debasish Jena, Saroj Kumar Panigrahy, Pradip Kumar Biswal, Sanjay Kumar Jena
2008 2008 First International Conference on Emerging Trends in Engineering and Technology  
In this paper, signature authentication along with signature encryption for smart card based on Digital Signature Authentication (DSA) using ECDLP has been proposed.  ...  In this paper, we propose a novel protocol for smart card based on Elliptic Curve Discrete Logarithm Problem (ECDLP).  ...  Terminal is a host defined as an off-card entity that requires establishing a secure channel with the smart card, application or smart card operating system (SCOS) as shown in Figure 1 , i.e., what terminal  ... 
doi:10.1109/icetet.2008.126 dblp:conf/icetet/JenaPBJ08 fatcat:n53lfntsmjdr3eidppyeazgh3q

Biometric User Authentication on Smart Cards by Means of Handwritten Signatures [chapter]

Olaf Henniger, Katrin Franke
2004 Lecture Notes in Computer Science  
This paper describes a biometric method for user authentication on smart cards. Smart cards are chip cards with the ability for data processing directly on the card.  ...  The feature-matching algorithm is a variant of dynamic time warping, taking the limited resources of smart cards into account. It is implemented as an operating prototype on two types of smart cards.  ...  Introduction Smart cards are chip cards with an integrated microprocessor chip.  ... 
doi:10.1007/978-3-540-25948-0_75 fatcat:pej6dzgkcbbzroptd6w7lbfgj4

Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme [chapter]

Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama
1991 Lecture Notes in Computer Science  
Therefore, our schemes are suitable for smart card applications.  ...  Moreover, verifiers can chock membership validity using public information independent of the number of users in an off-line environment.  ...  When these membership authentication schemes are implemented with smart cards, the following problems have to be considered.  ... 
doi:10.1007/3-540-46877-3_40 fatcat:glp5giaajnaurmnebhirjiybr4

Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks [article]

Yongge Wang
2012 arXiv   pre-print
off-line adversary.  ...  In this paper, we study the security requirements for remote authentication with password protected smart card.  ...  This example shows that the "off-line" dictionary attack in the stolen smart card environments is different from the traditional client-server based off-line dictionary attacks.  ... 
arXiv:1207.5497v1 fatcat:m6t3nyzjbnfahomhnm3x2kb2fa

Anonymous Services Using Smart Cards and Cryptography [chapter]

Sébastien Canard, Jacques Traoré
2004 IFIP International Federation for Information Processing  
We then propose more efficient list signature schemes, by using a smart card to produce the signature. We finally propose some concrete implementations of our proposals.  ...  Each member of the group is able to anonymously produce a signature on behalf of the group and a designated authority can, in some cases, revoke this anonymity.  ...  Opinion Polls In [6] , the authors propose an off-line electronic voting system based on list signature schemes.  ... 
doi:10.1007/1-4020-8147-2_6 fatcat:bhtsfeknynfubbleguz2qo425m

Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks [chapter]

Yongge Wang
2012 IFIP Advances in Information and Communication Technology  
off-line adversary.  ...  with a remote server.  ...  This example shows that the "off-line" dictionary attack in the stolen smart card environments is different from the traditional client-server based off-line dictionary attacks.  ... 
doi:10.1007/978-3-642-30436-1_40 fatcat:el2uxg2fn5ezhj63hj5mnzupee

تصمیم بطاقات صحیة ذکیة مؤمنة مرتبطة بهویة بیولوجیة للمواطنین

هاجر احمد فهمى
2020 مجلة العمارة والفنون والعلوم الإنسانية  
card by providing convenient and secured identity authentication using secured smart cards. ‫  ...  The smart health card offers many services that the regular identity card cannot accommodate, such as: illness history of citizens, dispensing drugs, allergies to certain drugs, etc., and the healthy card  ...  End of Card life The card is automatically turned off by the end of the life cycle of the card which is written on the card, or turned off by the card application provider.  ... 
doi:10.21608/mjaf.2019.19008.1365 fatcat:s5ktujwokzejnlyx2toky5lbba

A Smart-Card-Enabled Privacy Preserving E-Prescription System

Y. Yang, X. Han, F. Bao, R.H. Deng
2004 IEEE Transactions on Information Technology in Biomedicine  
In our system, patients' smart cards play an important role.  ...  For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription.  ...  Because of space limitation, we do not include this certificate in the smart card, thereby not providing a verifier for the convenience to verify a signature off-line.  ... 
doi:10.1109/titb.2004.824731 pmid:15055801 fatcat:gunrk6hrr5cbro72vlrnjltchm

Malleable Signatures for Resource Constrained Platforms [chapter]

Henrich C. Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann de Meer
2013 Lecture Notes in Computer Science  
We implemented one secure redactable and three secure sanitizable signature schemes on secure, but computationally bounded, smart card.  ...  The performance analysis of the four schemes shows only a small performance hit by the use of an off-the-shelf card.  ...  Secondly, the implementation should run on off-the-shelf smart cards; cheaper cards only offer fast modular arithmetics (e.g., needed for RSA signatures).  ... 
doi:10.1007/978-3-642-38530-8_2 fatcat:mpx7ctfzg5bj3fqo6nbbnkhyyi

SCB-HC-ECC–Based Privacy Safeguard Protocol for Secure Cloud Storage of Smart Card–Based Health Care System

Sudha Senthilkumar, K. Brindha, Natalia Kryvinska, Sweta Bhattacharya, Giridhar Reddy Bojja
2021 Frontiers in Public Health  
servers via smart health card solution providers.  ...  This has also resulted in a dire need for remote authentication schemes for transferring files of a sensitive nature, especially health-related information between patients, smart health cards, and cloud  ...  All these computations are completed off-line.  ... 
doi:10.3389/fpubh.2021.688399 pmid:34660507 pmcid:PMC8516396 fatcat:kf2dwvj72vdptnrkkapotwdhda

Saving On-Line Privacy [chapter]

Jan Camenisch, Gregory Neven
2010 IFIP Advances in Information and Communication Technology  
With the increasing use of electronic media for our daily transactions, we widely distribute our personal information.  ...  Acknowledgements The authors enjoyed many exciting discussions with the participants of the PrimeLife project, some of them leading us to write this overview. Thank you all!  ...  smart card, together with a proof that both credentials contain the same identifier as a smart card.  ... 
doi:10.1007/978-3-642-14282-6_3 fatcat:vkrzndnqsved3o263ihe5gdqya

Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs [chapter]

Adrian Spalka, Armin B. Cremers, Hanno Langweg
2001 IFIP Advances in Information and Communication Technology  
Due to their strong cryptographic properties an attacker is more likely to subvert them with malicious software, ie Trojan horse programs.  ...  Digital signatures are a key technology for many Internet-based commercial and administrative applications and, therefore, an increasingly popular target of attacks.  ...  Intelligent Adjunct functions The Intelligent Adjunct service provider (IASP) coordinates communication between the signature smart card and off-card resources.  ... 
doi:10.1007/0-306-46998-7_28 fatcat:3bwlmbhxpjckvayjckhffnhal4

Towards a Secure and Practical Multifunctional Smart Card [chapter]

Idir Bakdi
2006 Lecture Notes in Computer Science  
The proposed solution supports off-line transactions as well as post-issuance loading. Each application can load one or more "virtual tokens" (remotely) into a common smart card.  ...  One of the most promising features of smart card technology is its potential to serve several applications using a single hardware token.  ...  Drawbacks No Off-Line Functionality: As the card merely represents a pointer to a data set stored in the back-end system, it can only be used given an online access to the central database.  ... 
doi:10.1007/11733447_2 fatcat:so26mlhmcba4nkgefyfzef7lf4

A Secure and Efficient Off-line Electronic Transaction Protocol

Constantin POPESCU
2010 Studies in Informatics and Control  
environment such as smart card.  ...  In this paper we propose a secure and efficient off-line electronic transaction protocol based on an IDbased public key encryption system and group signature schemes, which is constructed from bilinear  ...  environment (payments using smart cards).  ... 
doi:10.24846/v19i1y201003 fatcat:53dlthfzonhxbfdiennfth4xym
« Previous Showing results 1 — 15 out of 10,319 results