Elliptic Curve Cryptography on E-passport Authentication Protocol

被引:0
|
作者
Saoudi, Safa [1 ]
Yousfi, Souheib [2 ]
Robbana, Riadh [2 ]
机构
[1] Polytech Sch Tunisia, Dept Comp Sci, La Marsa, Tunisia
[2] Natl Inst Appl Sci & Technol, Dept Comp Sci, Tunis, Tunisia
来源
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) | 2017年
关键词
E-passport; Authentication; Elliptic Curve Cryptography; Biometric; Shared Secret; BAN Logic;
D O I
10.1109/AICCSA.2017.176
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An electronic passport is a relatively new document type which many states are considering as a new form for travelling. E-passport is significantly more secure than a traditional passport. It promises the possibility of secure, simple and quick travel formalities. It is a relatively new feature and it deploys new technologies such as biometrics and Radio Frequency identification. We delve into security features and implications of this impending universal experiment of authentication technology. E-passport is involved in the improvement of travelling security. It is expected to protect data and guarantee authentication on inspection processes. International organizations are enhancing standards of E-passport security by implementation of new protocols. However, attackers still able to break them. In this paper, a new mechanism is presented to strengthen e-passport authentication process. We propose a new protocol based on Elliptic Curve, Identity-Based Encryption and Shared Secret between entities. We formally analyse the authentication of the protocol using the BAN Logic language, which is specially dedicated to describe and verify security protocols. This proposal aims to provide a secure data storage and authentication.
引用
收藏
页码:1253 / 1260
页数:8
相关论文
共 50 条
  • [31] A study on secure protocol using the Public Key Infrastructure approach in an e-passport
    Choi, Yong-Sik
    Jeon, Young-Jun
    Park, Sang-Hyun
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 458 - 463
  • [32] Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Gupta, Vidushi
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (03) : 643 - 653
  • [33] An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography
    Zhang, Zezhong
    Qi, Qingqing
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)
  • [34] A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
    Kumar, Vinod
    Ahmad, Musheer
    Kumari, Adesh
    TELEMATICS AND INFORMATICS, 2019, 38 : 100 - 117
  • [35] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Zhang, Liping
    Tang, Shanyu
    Chen, Jing
    Zhu, Shaohui
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) : 53 - 75
  • [36] An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
    Sowjanya, K.
    Dasgupta, Mou
    Ray, Sangram
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (01) : 129 - 146
  • [37] An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
    K. Sowjanya
    Mou Dasgupta
    Sangram Ray
    International Journal of Information Security, 2020, 19 : 129 - 146
  • [38] An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography
    Zezhong Zhang
    Qingqing Qi
    Journal of Medical Systems, 2014, 38
  • [39] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Liping Zhang
    Shanyu Tang
    Jing Chen
    Shaohui Zhu
    Wireless Personal Communications, 2015, 81 : 53 - 75
  • [40] A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    Shu, Wesley
    Hsu, Kevin C.
    Liao, Min-Wen
    NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 183 - 190