Solving terminal revocation in EAC by augmenting terminal authentication

作者: Rafik Chaabouni

DOI:

关键词: AuthorizationComputer networkTerminal (electronics)Computer scienceExtended Access ControlAuthenticationRevocationComputer securitySignature (logic)Public-key cryptography

摘要: In this paper we propose a solution to enable an accurate terminal revocation in the Extended Access Control (EAC). Chaabouni and Vaudenay [CV09] pointed out need for procedure, but failed provide complete description. We aim at filling gap. Our relies on augmenting authentication with t-out-of-l threshold signature provided by neighboring terminals. These terminals will be charge of checking status requested terminal. As Terminals have real clock embedded more computational power than Machine Readable Travel Documents (MRTDs), they are better suited status.

参考文章(17)
Jens Bender, Marc Fischlin, Dennis Kügler, Security Analysis of the PACE Key-Agreement Protocol international conference on information security. pp. 33- 48 ,(2009) , 10.1007/978-3-642-04474-8_3
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Threshold RSA for dynamic and ad-hoc groups international cryptology conference. pp. 88- 107 ,(2008) , 10.1007/978-3-540-78967-3_6
Serge Vaudenay, Rafik Chaabouni, The Extended Access Control for Machine Readable Travel Documents biometrics and electronic signatures. pp. 93- 103 ,(2009)
Brian King, Improved Methods to Perform Threshold RSA international conference on the theory and application of cryptology and information security. pp. 359- 372 ,(2000) , 10.1007/3-540-44448-3_27
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
S Vaudenay, M Vuagnoux, About Machine-Readable Travel Documents international conference on supercomputing. ,vol. 77, pp. 012006- ,(2007) , 10.1088/1742-6596/77/1/012006
Yvo G. Desmedt, Yair Frankel, Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group SIAM Journal on Discrete Mathematics. ,vol. 7, pp. 667- 679 ,(1994) , 10.1137/S0895480192224713
Rima Belguechi, Patrick Lacharme, Christophe Rosenberger, Enhancing the privacy of electronic passports International Journal of Information Technology and Management. ,vol. 11, pp. 122- 137 ,(2012) , 10.1504/IJITM.2012.044069
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017