How Smartcards Helped to Solve a Cryptographic Paradox
نویسندگان
چکیده
The use of smartcards allows for interesting properties of security protocols and services. In this paper we present an example of application of smartcards within the eld of electronic voting schemes. To be concrete, the use of smartcards has helped us to develop the rst electronic voting protocol which simultaneously satisses three properties apparently contradictory: uncoercibility, veriiability and mobility.
منابع مشابه
Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags
Radio Frequency Identification (RFID) systems can be found in wide spread applications – from simple theft prevention over multi bit transponders up to complex applications involving contactless smartcards. This paper shows that the security gap between low-cost RFID Tags that only provide simple security features and contactless smartcards can be filled. It is examined how much energy a passiv...
متن کاملAgent Platform for Wireless Sensor Network with Support for Cryptographic Protocols
This paper deals with a description of wireless sensor networks at the beginning. Further follows the introduction to the agent platform suitable for wireless networks. Mobile code and sensor networks suffer from considerable security problems. Our proposal of countermeasure is based on combination of smartcards with sensor nodes. Smartcards as a tamper resistant devices offer solution for the ...
متن کاملHow to Make Smartcards Resistant to Hackers' Lightsabers?
Cracking smartcards has always been a prized hobby, for the academic glory, for fun (ha, breaking the selfclaimed unbreakable...) and for profit (ask the organized crime). State-of-the-art techniques include laser blasts that inject various transient or permanent faults in a program execution, potentially making the smartcard do whatever the attacker wants. After a brief recap of the attack too...
متن کاملBreaking Smartcards Using Power Analysis
Smartcards are used Today in many applications, including cash retrieval, shop transactions, on-line banking, Pay-TV services, anti-theft protection and many more. Many of these services attract the interest of people in pirating the smartcards. For example, an attacker might make an illegal copy of a smartcard used in Pay-TV services and sell it. The owner of this illegal copy could then benef...
متن کاملAnonymous Authentication for Smartcards
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smartcard authentication. Currently the smartcards are used for many purposes e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without ou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998