Secure personalization using proxy cryptography

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we describe new secure personalization schemes using proxy cryptography. We first introduce the context of a large scale smart card application such as an electronic purse, the current personalization schemes and the security requirements. We recall the notion of proxy cryptography and we consider an actual proxy cryptosystem based on ElGamal public key encryption. With this proxy cryptosystem we setup new security schemes for smart cards personalization and we show that they are more secure, flexible and cheap than existing ones.

Cite

CITATION STYLE

APA

Girard, P. (2000). Secure personalization using proxy cryptography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1820, pp. 326–335). Springer Verlag. https://doi.org/10.1007/10721064_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free