Techniques for low cost authentication and message authentication

被引:0
|
作者
Gilbert, H [1 ]
机构
[1] CNET, DTL SSR, F-92131 Issy Les Moulineaux, France
关键词
information authentication; payment systems; prepaid cards; telephone cards; unconditional security; synchronous cards;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unconditional security techniques may represent an advantageous alternative to computational security techniques for smart card systems providing authentication or message authentication when the number of authentications needed during the lifetime of each key is limited. In this paper we propose simple algorithms based on modulo 2 scalar products among binary vectors which are easy to implement in so-called synchronous cards, require a reasonable amount of secret key bits (typically 10 to 20 bits per authentication), and provide provably secure authentication and message authentication. Applications mainly include low cost prepaid cards for telephone, parking meters, transportation, automatic vending machines, etc.
引用
收藏
页码:183 / 192
页数:10
相关论文
共 50 条
  • [1] MESSAGE AUTHENTICATION
    JUENEMAN, RR
    MATYAS, SM
    MEYER, CH
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1985, 23 (09) : 29 - 40
  • [2] On the Energy and Computational Cost of Message Authentication Schemes for GNSS
    Curran, James
    Hanley, Neil
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2019, 34 (01) : 40 - 53
  • [3] Approximate message authentication and biometric entity authentication
    Di Crescenzo, G
    Graveman, R
    Ge, R
    Arce, G
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 240 - 254
  • [4] Passthoughts Authentication with Low Cost EarEEG
    Curran, Max T.
    Yang, Jong-kai
    Merrill, Nick
    Chuang, John
    [J]. 2016 38TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2016, : 1979 - 1982
  • [5] Message authentication for stream
    Kuwakado, H
    Tanaka, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (01) : 190 - 193
  • [6] Message Authentication, Revisited
    Dodis, Yevgeniy
    Kiltz, Eike
    Pietrzak, Krzysztof
    Wichs, Daniel
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 355 - 374
  • [7] Group Message Authentication
    Przydatek, Bartosz
    Wikstroem, Douglas
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 399 - 417
  • [8] QR Code Authentication with Embedded Message Authentication Code
    Changsheng Chen
    [J]. Mobile Networks and Applications, 2017, 22 : 383 - 394
  • [9] QR Code Authentication with Embedded Message Authentication Code
    Chen, Changsheng
    [J]. MOBILE NETWORKS & APPLICATIONS, 2017, 22 (03): : 383 - 394
  • [10] A Low Computation Message Delivery and Authentication VANET Protocol
    Ahmed, Islam Z.
    Mohamed, Taha M.
    Sadek, Rowayda A.
    [J]. 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 204 - 211