Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures

  • Marc Girault
Conference paper

DOI: 10.1007/10721064_14

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1820)
Cite this paper as:
Girault M. (2000) Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures. In: Quisquater JJ., Schneier B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg

Abstract

We address the problem of relaxing tamper-resistance requirements for smart cards by deriving short-term asymmetric keys from a long-term asymmetric signature key, while increasing as few as possible the amount of memory necessary to store them. This leads us to consider (auto-)proxy signatures in the sense of Mambo, Usada and Okamoto [MUO], and to provide a generic and secure method for constructing such schemes. Then we give six different schemes generated this way, among which all the proxy signature schemes known to date appear as particular cases, and compare them in terms of efficiency, flexibility and transparency.

Keywords

Smart cards tamper-resistance short-term keys digital signatures proxy signatures 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Marc Girault
    • 1
  1. 1.France Telecom, CNETCAEN CedexFRANCE

Personalised recommendations