TY - GEN
T1 - A framework of authentic post-issuance program modification for multi-application smart cards
AU - Uddin, Mohammad Mesbah
AU - Zabir, Salahuddin Muhammad Salim
AU - Nohara, Yasunobu
AU - Yasuura, Hiroto
PY - 2008/12/1
Y1 - 2008/12/1
N2 - Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.
AB - Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.
UR - http://www.scopus.com/inward/record.url?scp=62749085666&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=62749085666&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:62749085666
SN - 1601320914
SN - 9781601320919
T3 - Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008
SP - 288
EP - 294
BT - Proceedings of the 2008 International Conference on Wireless Networks, ICWN 2008
T2 - 2008 International Conference on Wireless Networks, ICWN 2008
Y2 - 14 July 2008 through 17 July 2008
ER -