Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures
- Cite this paper as:
- Girault M. (2000) Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures. In: Quisquater JJ., Schneier B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg
We address the problem of relaxing tamper-resistance requirements for smart cards by deriving short-term asymmetric keys from a long-term asymmetric signature key, while increasing as few as possible the amount of memory necessary to store them. This leads us to consider (auto-)proxy signatures in the sense of Mambo, Usada and Okamoto [MUO], and to provide a generic and secure method for constructing such schemes. Then we give six different schemes generated this way, among which all the proxy signature schemes known to date appear as particular cases, and compare them in terms of efficiency, flexibility and transparency.
KeywordsSmart cards tamper-resistance short-term keys digital signatures proxy signatures
Unable to display preview. Download preview PDF.