A framework of authentic post-issuance program modification for multi-application smart cards

Mohammad Mesbah Uddin, Salahuddin Muhammad Salim Zabir, Yasunobu Nohara, Hiroto Yasuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.

Original languageEnglish
Title of host publicationProceedings of the 2008 International Conference on Wireless Networks, ICWN 2008
Pages288-294
Number of pages7
Publication statusPublished - Dec 1 2008
Event2008 International Conference on Wireless Networks, ICWN 2008 - Las Vegas, NV, United States
Duration: Jul 14 2008Jul 17 2008

Publication series

NameProceedings of the 2008 International Conference on Wireless Networks, ICWN 2008

Other

Other2008 International Conference on Wireless Networks, ICWN 2008
CountryUnited States
CityLas Vegas, NV
Period7/14/087/17/08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'A framework of authentic post-issuance program modification for multi-application smart cards'. Together they form a unique fingerprint.

Cite this