A framework of authentic post-issuance program modification for multi-application smart cards

Mohammad Mesbah Uddin, Salahuddin Muhammad Salim Zabir, Yasunobu Nohara, Hiroto Yasuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.

Original languageEnglish
Title of host publicationProceedings of the 2008 International Conference on Wireless Networks, ICWN 2008
Pages288-294
Number of pages7
Publication statusPublished - Dec 1 2008
Event2008 International Conference on Wireless Networks, ICWN 2008 - Las Vegas, NV, United States
Duration: Jul 14 2008Jul 17 2008

Publication series

NameProceedings of the 2008 International Conference on Wireless Networks, ICWN 2008

Other

Other2008 International Conference on Wireless Networks, ICWN 2008
CountryUnited States
CityLas Vegas, NV
Period7/14/087/17/08

Fingerprint

Smart cards
Hash functions
Function generators
Authentication
Costs

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering

Cite this

Uddin, M. M., Zabir, S. M. S., Nohara, Y., & Yasuura, H. (2008). A framework of authentic post-issuance program modification for multi-application smart cards. In Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008 (pp. 288-294). (Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008).

A framework of authentic post-issuance program modification for multi-application smart cards. / Uddin, Mohammad Mesbah; Zabir, Salahuddin Muhammad Salim; Nohara, Yasunobu; Yasuura, Hiroto.

Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008. 2008. p. 288-294 (Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Uddin, MM, Zabir, SMS, Nohara, Y & Yasuura, H 2008, A framework of authentic post-issuance program modification for multi-application smart cards. in Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008. Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008, pp. 288-294, 2008 International Conference on Wireless Networks, ICWN 2008, Las Vegas, NV, United States, 7/14/08.
Uddin MM, Zabir SMS, Nohara Y, Yasuura H. A framework of authentic post-issuance program modification for multi-application smart cards. In Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008. 2008. p. 288-294. (Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008).
Uddin, Mohammad Mesbah ; Zabir, Salahuddin Muhammad Salim ; Nohara, Yasunobu ; Yasuura, Hiroto. / A framework of authentic post-issuance program modification for multi-application smart cards. Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008. 2008. pp. 288-294 (Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008).
@inproceedings{ab90875aa1264a6ebd888fa73e69bbfe,
title = "A framework of authentic post-issuance program modification for multi-application smart cards",
abstract = "Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.",
author = "Uddin, {Mohammad Mesbah} and Zabir, {Salahuddin Muhammad Salim} and Yasunobu Nohara and Hiroto Yasuura",
year = "2008",
month = "12",
day = "1",
language = "English",
isbn = "1601320914",
series = "Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008",
pages = "288--294",
booktitle = "Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008",

}

TY - GEN

T1 - A framework of authentic post-issuance program modification for multi-application smart cards

AU - Uddin, Mohammad Mesbah

AU - Zabir, Salahuddin Muhammad Salim

AU - Nohara, Yasunobu

AU - Yasuura, Hiroto

PY - 2008/12/1

Y1 - 2008/12/1

N2 - Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.

AB - Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.

UR - http://www.scopus.com/inward/record.url?scp=62749085666&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=62749085666&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:62749085666

SN - 1601320914

SN - 9781601320919

T3 - Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008

SP - 288

EP - 294

BT - Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008

ER -