E-passport EAC scheme based on Identity-Based Cryptography

被引:5
|
作者
Li, C. H. [1 ]
Zhang, X. F. [1 ]
Jin, H. [1 ]
Xiang, W. [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
关键词
E-passport security; Extended Access Control; Identity-Based Cryptography; Safety/security in digital systems;
D O I
10.1016/j.ipl.2010.10.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Extended Access Control (EAC) is a security mechanism specified to allow only authorized Inspection System (IS) to read sensitive biometric data such as fingerprints from e-passports. Although European Union EAC scheme offers more flexibility than Singapore scheme, there is clearly room for improvement. By adopting Identity-Based Cryptography (IBC) technology, a simple and secure EAC implementation scheme (IBC-EAC) is proposed. The authorization mechanism based on IBC is more trustable because the access right to sensitive data is granted directly to the IS through Authorized Smartcard. A new authentication protocol based on IBC is performed between the e-passport chip and the Authorized Smartcard. The protocol also provides an important contribution towards terminal revocation. By using IBC-EAC scheme, the complexity of deploying and managing PKI can be reduced. And the computational cost for e-passport to verify the certificate chain in EU-EAC scheme can be saved. (c) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:26 / 30
页数:5
相关论文
共 50 条
  • [1] A Novel E-passport Authentication System Based on Visual Cryptography
    Han, Yanyan
    Ge, Xiaonan
    He, Wencai
    Xu, Zhuolin
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND INTELLIGENT CONTROL (ISIC 2015), 2015, : 420 - 425
  • [2] An Identity-based Cryptography Scheme Based on FullIdent Algorithm
    Xie Yumin
    Kamran, Muhammad
    [J]. JOURNAL OF COMPUTERS, 2014, 9 (11) : 2691 - 2696
  • [3] Implementation of Cryptography Algorithm for E-Passport Security
    Sharma, Shruti
    Zodpe, Harshali
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 335 - 337
  • [4] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    [J]. 2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
  • [5] Electronic payment scheme using identity-based cryptography
    Nguyen, Son Thanh
    Rong, Chunming
    [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 330 - +
  • [6] Elliptic Curve Cryptography on E-passport Authentication Protocol
    Saoudi, Safa
    Yousfi, Souheib
    Robbana, Riadh
    [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1253 - 1260
  • [7] Introduction to identity-based cryptography
    Joux, Antoine
    [J]. Cryptology and Information Security Series, 2009, 2 : 1 - 12
  • [8] SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
    Mihai-Lica, Pura
    Victor-Valeriu, Patriciu
    Ion, Bica
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 135 - 139
  • [9] Identity-based cryptography for grid
    Li, Hongwei
    Sun, Shixin
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 132 - +
  • [10] Towards a secure E-passport protocol based on biometrics
    Abid, Mohamed
    Afifi, Hossam
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 338 - 345