A framework of authentic post-issuance program modification for multi-application smart cards

Mohammad Mesbah Uddin, Salahuddin Muhammad Salim Zabir, Yasunobu Nohara, Hiroto Yasuura

研究成果: 著書/レポートタイプへの貢献会議での発言

抄録

Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.

元の言語英語
ホスト出版物のタイトルProceedings of the 2008 International Conference on Wireless Networks, ICWN 2008
ページ288-294
ページ数7
出版物ステータス出版済み - 12 1 2008
イベント2008 International Conference on Wireless Networks, ICWN 2008 - Las Vegas, NV, 米国
継続期間: 7 14 20087 17 2008

出版物シリーズ

名前Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008

その他

その他2008 International Conference on Wireless Networks, ICWN 2008
米国
Las Vegas, NV
期間7/14/087/17/08

Fingerprint

Smart cards
Hash functions
Function generators
Authentication
Costs

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering

これを引用

Uddin, M. M., Zabir, S. M. S., Nohara, Y., & Yasuura, H. (2008). A framework of authentic post-issuance program modification for multi-application smart cards. : Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008 (pp. 288-294). (Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008).

A framework of authentic post-issuance program modification for multi-application smart cards. / Uddin, Mohammad Mesbah; Zabir, Salahuddin Muhammad Salim; Nohara, Yasunobu; Yasuura, Hiroto.

Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008. 2008. p. 288-294 (Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008).

研究成果: 著書/レポートタイプへの貢献会議での発言

Uddin, MM, Zabir, SMS, Nohara, Y & Yasuura, H 2008, A framework of authentic post-issuance program modification for multi-application smart cards. : Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008. Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008, pp. 288-294, 2008 International Conference on Wireless Networks, ICWN 2008, Las Vegas, NV, 米国, 7/14/08.
Uddin MM, Zabir SMS, Nohara Y, Yasuura H. A framework of authentic post-issuance program modification for multi-application smart cards. : Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008. 2008. p. 288-294. (Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008).
Uddin, Mohammad Mesbah ; Zabir, Salahuddin Muhammad Salim ; Nohara, Yasunobu ; Yasuura, Hiroto. / A framework of authentic post-issuance program modification for multi-application smart cards. Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008. 2008. pp. 288-294 (Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008).
@inproceedings{ab90875aa1264a6ebd888fa73e69bbfe,
title = "A framework of authentic post-issuance program modification for multi-application smart cards",
abstract = "Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.",
author = "Uddin, {Mohammad Mesbah} and Zabir, {Salahuddin Muhammad Salim} and Yasunobu Nohara and Hiroto Yasuura",
year = "2008",
month = "12",
day = "1",
language = "English",
isbn = "1601320914",
series = "Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008",
pages = "288--294",
booktitle = "Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008",

}

TY - GEN

T1 - A framework of authentic post-issuance program modification for multi-application smart cards

AU - Uddin, Mohammad Mesbah

AU - Zabir, Salahuddin Muhammad Salim

AU - Nohara, Yasunobu

AU - Yasuura, Hiroto

PY - 2008/12/1

Y1 - 2008/12/1

N2 - Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.

AB - Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.

UR - http://www.scopus.com/inward/record.url?scp=62749085666&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=62749085666&partnerID=8YFLogxK

M3 - Conference contribution

SN - 1601320914

SN - 9781601320919

T3 - Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008

SP - 288

EP - 294

BT - Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008

ER -