A provable secure access control using smart cards
نویسندگان
چکیده
An access control scheme integrating with user authentication is proposed. Though the scheme is provably secure in request messaging (authentication), there is a flaw in access control. This paper presents an attack on the access control system; and further, an improvement is proposed to remedy this flaw. Our improvement only increases the information size and the cost of computations during registration time, but these quantities are not increased during the login and verification phase.
منابع مشابه
Hardware and Software Symbiosis Helps Smart Card Evolution
The need to manage and secure a rapidly growing information network has focused increasing attention on smart card technology. Over the past decade, smart cards evolved from offering basic memory to complex systems with chips that incorporate powerful processing units with dedicated peripherals. This evolution enabled a wide range of applications. Smart card applications include financial trans...
متن کاملA Provably Secure and Practical Signature Scheme for Smart Cards
By ”secure”, we mean that some well-defined computational assumption can be shown to be sufficient for the scheme not to be existentially forgeable, even under an adaptive chosen message attack. Most, if not all, signature schemes used in practice are based on a computational assumption that is certainly necessary for this kind of security, not known to be sufficient. Since the work of Goldwass...
متن کاملSecurity Analysis of a Practical \ on the y " Authentication and
In response to the current need for fast, secure and cheap public-key cryptography, we study an interactive zero-knowledge identi-cation scheme and a derived signature scheme that combine provable security based on the general problem of computing discrete logarithms modulo any number, short identity-based keys, very short transmission and minimal on-line computation. This leads to both eecient...
متن کاملSecure Watemarking Method with Smart Card
we treat in this paper a secure authentication method using watermarking, smart card and cryptography. It can serve to control logical and physical access and the network access and to prove the card owner identity.This method is very secure because the high level of security of smart card, the method of watermarking and detection and the complexity of the algorithm RSA and DES aim to remove th...
متن کاملPrototyping Web-Based Smart Flow Multi-Application System using Smart Card Technology
These days smart cards are replacing traditional magnetic cards for payment transactions. One of the main reasons is the enhanced security capabilities built into a smart card. Most of the related works in smart card only concentrates on the single application such as network access control, prepaid phone card or debit card. With popularity in web technologies, there is a trend towards smart ca...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Trans. Consumer Electronics
دوره 49 شماره
صفحات -
تاریخ انتشار 2003