Abstract
Code and data sharing is an important issue in Java Card. The Java Card 2.2 introduced an object sharing scheme to allow client applets to access to the server applet methods using a sharable interface object. This method suffers from some security problems such as Applet Identifier impersonation. For solving those problems, we propose two secure object sharing schemes based on the delegate model introduced by Montgomery and Krishna. Our schemes have some significant improvement over the original model in that a client applet in our system needs only one key.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
“Java card special interest group.,” http://www.javacard.org/others/what-is-java-card.html.
“Java card applet developer’s guide,” tech. rep., July 17, 1998.
M. Montgomery and K. Krishna, “Secure object sharing in java card,” in USENIX Workshop on Smart card Technology, May 10–11 1999.
“Java card 2.2 virtual machine specification,” tech. rep., 2002. http:http://java.sun.com/products/javacard/JCVMSpec.pdf.
“Java card 2.2 paltform specification,/rd tech. rep., 2002. http://java.sun.com/products/javacard/.
“Java card 2.2 application programming interfaces specification,” tech. rep., 2002. http://java.sun.com/products/javacard.
“Java card 2.2 runtime environment specification,” tech. rep., 2002. http://java.sun.com/products/javacard/JCRESpec.pdf.
Y. Mu, V. Varadharajan, and K. Q. Nguyen, “Delegated decryption,” in Cryptography and Code, Lecture Notes in Computer Science, Springer Verlag, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, J., Varadharajan, V., Mu, Y. (2002). A Secure Object Sharing Scheme for Java Card. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_21
Download citation
DOI: https://doi.org/10.1007/3-540-36159-6_21
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00164-5
Online ISBN: 978-3-540-36159-6
eBook Packages: Springer Book Archive