Browse > Article

An Efficient Authentication Scheme for Downloading and Updating Applications in Smart Cards  

박용수 (서울대학교 컴퓨터학과)
조유근 (서울대학교 컴퓨터공학부)
Abstract
In this paper we propose a method for authenticating the application that is to be downloaded or updated in smart cards. Previous works have some drawbacks such as having a long verification delay or requiring a large amount of primary/secondary storage. We propose an efficient parameterized scheme by using the hash chain technique where the secondary storage requirement and verification delay of updating the application are O(k) and O(k+n/k), respectively. Moreover, both the first storage requirement and verification delay of downloading the application are O(1).
Keywords
security; authentication; digital signature; smart card;
Citations & Related Records
연도 인용수 순위
  • Reference
1 FIPS 180-1, Secure Hash Standard. Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April, 1995
2 Luke O'Conner and Gunter Karjoth, Efficient Downloading and Updating Applications on Portable Devices using Authentication Trees, In Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, pages 20-22, September, 2000
3 J,F. Dhem, Design of an efficient public key cryptographic library for RISC-based smart cards. PhD Thesis, Universite catholique de Louvain, 1998
4 H. Dobbertin, A. Bosselaers, B. Preneel, RIPEMD-160, a strengthened version of RIPEMD, Fase Software Encryption, LNCS 1039, Springer-Verlag, pages 71-82, 1996   DOI
5 Rosario Gennaro and Pankaj Rohatgi, How to Sign Digital Streams. In CRYPTO'97, pages 180-197, 1997
6 L. Reyzin, N. Reyzin, Better than Bilsa: Short One-time Signatures with Fast Signing and Verifying, In 7th Australian Conference on Information Security and Privacy, Melbourne, Australia, 2002
7 Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar, Efficient Authentication and Signing of Multicast Streams over Lossy Channels, In Proceedings of IEEE Security and Privacy Symposium, May, 2000
8 R. L. Rivest, A. Shamir, and L. M. Adelman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, no.2 pages 120-126, 1978   DOI   ScienceOn
9 Chung Kei Wong and Simon S. Lam, Digital Signatures for Flows and Multicasts, IEEE/ACM Transactions on Networking, 7(4):502-513, 1999   DOI   ScienceOn
10 Pankaj Rohatgi, A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication, In 6th ACM Conference on Computer and Communication Security, pages 93-100, November, 1999   DOI
11 Ralph C. Merkle, A Certified Digital Signature. In CRYPTO'89. pages 218-238, 1989
12 Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997
13 Philippe Golle and Nagendra Modadugu, Authenticating Streamed Data in the Presence of Random Packet Loss, In Network and Distributed System Security Symposium, San Diego, pages 1322, February 2001