Abstract
The established legal value of digital signatures and the growing availability of identity-based digital services are progressively extending the use of smart cards to all citizens, opening new challenging scenarios. Among them, motivated by concrete applications, secure and practical delegation of digital signatures is becoming more and more critical. Unfortunately, secure delegation systems proposed so far (e.g., proxy signatures) include various drawbacks for any practical system.
In this work we put forth the notion of a “Proxy Smart Card System”, a distributed system that allows a smart card owner to delegate part of its computations (e.g., signatures of messages) to remote users. We stress the problematic aspects concerning the use of known proxy-cryptography schemes in synergy with current standard technologies. This in turn motivates the need of proxy smart card systems. Then we formalize the security and functional requirements of a proxy smart card system, identifying the involved parties, the adversary model and the usability properties. Finally, we present the design and analysis of a proxy smart card system which outperforms the current state of the art.
This work has been supported in part by the joint project “SmartSEC”, with Bit4ID S.r.l., financed by Italian Ministry of Economic Development in the framework P.O.N. 2000-2006 - Misura 2.1.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile (1999)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: ACM Conference on Computer and Communications Security, pp. 48–57 (1996)
Mambo, M., Okamoto, E.: Proxy cryptosystem: delegation of the power to decrypt ciphertexts. IEICE Trans. Fundamentals E80-A(1), 54–63 (1997)
Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: SCIS, pp. 603–608 (2001)
RSA Laboratories: PKCS #11: Cryptographic Token Interface Standard, http://www.rsa.com/rsalabs/node.asp?id=2133
Ferraiolo, D.F., Kuhn, D.R.: Role based access control. In: 15th National Computer Security Conference, pp. 554–563 (1992)
Network Working Group: The Transport Layer Security (TLS) Protocol Version 1.2 (2008), http://tools.ietf.org/html/rfc5246
Catuogno, L., Visconti, I.: A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 219–233. Springer, Heidelberg (2003)
Catuogno, L., Visconti, I.: An Architecture for Kernel-Level Verification of Executables at Run Time. Comput. J. 47(5), 511–526 (2004)
Catuogno, L., Gassirà, R., Masullo, M., Visconti, I.: Securing Operating System Services Based on Smart Cards. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 321–330. Springer, Heidelberg (2005)
Network Working Group: S/MIME Version 3 Message Specification (1999), http://tools.ietf.org/html/rfc2633
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP International Federation for Information Processing
About this paper
Cite this paper
Cattaneo, G., Faruolo, P., Palazzo, V., Visconti, I. (2010). Proxy Smart Card Systems. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds) Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. WISTP 2010. Lecture Notes in Computer Science, vol 6033. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12368-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-12368-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12367-2
Online ISBN: 978-3-642-12368-9
eBook Packages: Computer ScienceComputer Science (R0)