Techniques for Low Cost Authentication and Message Authentication View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2000

AUTHORS

Henri Gilbert

ABSTRACT

Unconditional security techniques may represent an advantageous alternative to computational security techniques for smart card systems providing authentication or message authentication when the number of authentications needed during the lifetime of each key is limited. In this paper we propose simple algorithms based on modulo 2 scalar products among binary vectors which are easy to implement in so-called synchronous cards, require a reasonable amount of secret key bits (typically 10 to 20 bits per authentication), and provide provably secure authentication and message authentication. Applications mainly include low cost prepaid cards for telephone, parking meters, transportation, automatic vending machines, etc. More... »

PAGES

183-192

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/10721064_16

DOI

http://dx.doi.org/10.1007/10721064_16

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1016949542


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "France T\u00e9l\u00e9com, CNET DTL-SSR, 38-40 Rue du G\u00e9n\u00e9ral Leclerc, 92131, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "France T\u00e9l\u00e9com, CNET DTL-SSR, 38-40 Rue du G\u00e9n\u00e9ral Leclerc, 92131, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gilbert", 
        "givenName": "Henri", 
        "id": "sg:person.012771236207.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2000", 
    "datePublishedReg": "2000-01-01", 
    "description": "Unconditional security techniques may represent an advantageous alternative to computational security techniques for smart card systems providing authentication or message authentication when the number of authentications needed during the lifetime of each key is limited. In this paper we propose simple algorithms based on modulo 2 scalar products among binary vectors which are easy to implement in so-called synchronous cards, require a reasonable amount of secret key bits (typically 10 to 20 bits per authentication), and provide provably secure authentication and message authentication. Applications mainly include low cost prepaid cards for telephone, parking meters, transportation, automatic vending machines, etc.", 
    "editor": [
      {
        "familyName": "Quisquater", 
        "givenName": "Jean-Jacques", 
        "type": "Person"
      }, 
      {
        "familyName": "Schneier", 
        "givenName": "Bruce", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/10721064_16", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-67923-3", 
        "978-3-540-44534-0"
      ], 
      "name": "Smart Card Research and Applications", 
      "type": "Book"
    }, 
    "keywords": [
      "message authentication", 
      "security techniques", 
      "number of authentication", 
      "smart card system", 
      "low-cost authentication", 
      "secret key bits", 
      "automatic vending machines", 
      "authentication", 
      "card system", 
      "parking meters", 
      "reasonable amount", 
      "vending machines", 
      "key bits", 
      "simple algorithm", 
      "cards", 
      "binary vector", 
      "machine", 
      "algorithm", 
      "low cost", 
      "technique", 
      "bits", 
      "key", 
      "applications", 
      "cost", 
      "scalar product", 
      "system", 
      "vector", 
      "transportation", 
      "lifetime", 
      "number", 
      "meters", 
      "telephone", 
      "amount", 
      "alternative", 
      "advantageous alternative", 
      "products", 
      "paper"
    ], 
    "name": "Techniques for Low Cost Authentication and Message Authentication", 
    "pagination": "183-192", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1016949542"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/10721064_16"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/10721064_16", 
      "https://app.dimensions.ai/details/publication/pub.1016949542"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-11-24T21:13", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221124/entities/gbq_results/chapter/chapter_199.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/10721064_16"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/10721064_16'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/10721064_16'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/10721064_16'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/10721064_16'


 

This table displays all metadata directly associated to this object as RDF triples.

101 TRIPLES      22 PREDICATES      62 URIs      55 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/10721064_16 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author N55707c36b224419fb538af140ebe8d72
4 schema:datePublished 2000
5 schema:datePublishedReg 2000-01-01
6 schema:description Unconditional security techniques may represent an advantageous alternative to computational security techniques for smart card systems providing authentication or message authentication when the number of authentications needed during the lifetime of each key is limited. In this paper we propose simple algorithms based on modulo 2 scalar products among binary vectors which are easy to implement in so-called synchronous cards, require a reasonable amount of secret key bits (typically 10 to 20 bits per authentication), and provide provably secure authentication and message authentication. Applications mainly include low cost prepaid cards for telephone, parking meters, transportation, automatic vending machines, etc.
7 schema:editor N2135fcc25dcd4992bc01ea09db2e8104
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf N77bf1823bf8c4b7fba66765b507a6cc5
11 schema:keywords advantageous alternative
12 algorithm
13 alternative
14 amount
15 applications
16 authentication
17 automatic vending machines
18 binary vector
19 bits
20 card system
21 cards
22 cost
23 key
24 key bits
25 lifetime
26 low cost
27 low-cost authentication
28 machine
29 message authentication
30 meters
31 number
32 number of authentication
33 paper
34 parking meters
35 products
36 reasonable amount
37 scalar product
38 secret key bits
39 security techniques
40 simple algorithm
41 smart card system
42 system
43 technique
44 telephone
45 transportation
46 vector
47 vending machines
48 schema:name Techniques for Low Cost Authentication and Message Authentication
49 schema:pagination 183-192
50 schema:productId N9a9bc82c26074af4af182ad4fd14b923
51 N9fba4d32fd014dabbba809255fb276cd
52 schema:publisher N1284b9c2a5b047be95e54f0f3fff682a
53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016949542
54 https://doi.org/10.1007/10721064_16
55 schema:sdDatePublished 2022-11-24T21:13
56 schema:sdLicense https://scigraph.springernature.com/explorer/license/
57 schema:sdPublisher N76ffb197e628452b9d824c080d079b1d
58 schema:url https://doi.org/10.1007/10721064_16
59 sgo:license sg:explorer/license/
60 sgo:sdDataset chapters
61 rdf:type schema:Chapter
62 N1284b9c2a5b047be95e54f0f3fff682a schema:name Springer Nature
63 rdf:type schema:Organisation
64 N2135fcc25dcd4992bc01ea09db2e8104 rdf:first Ne57c6c8a9b7d4802a964c3afe910e503
65 rdf:rest Na8f8d9c2ecb847df8a889a3a2d622323
66 N55707c36b224419fb538af140ebe8d72 rdf:first sg:person.012771236207.08
67 rdf:rest rdf:nil
68 N76ffb197e628452b9d824c080d079b1d schema:name Springer Nature - SN SciGraph project
69 rdf:type schema:Organization
70 N77bf1823bf8c4b7fba66765b507a6cc5 schema:isbn 978-3-540-44534-0
71 978-3-540-67923-3
72 schema:name Smart Card Research and Applications
73 rdf:type schema:Book
74 N9a9bc82c26074af4af182ad4fd14b923 schema:name dimensions_id
75 schema:value pub.1016949542
76 rdf:type schema:PropertyValue
77 N9ca7abeb9f0945b882b41d00a623393b schema:familyName Schneier
78 schema:givenName Bruce
79 rdf:type schema:Person
80 N9fba4d32fd014dabbba809255fb276cd schema:name doi
81 schema:value 10.1007/10721064_16
82 rdf:type schema:PropertyValue
83 Na8f8d9c2ecb847df8a889a3a2d622323 rdf:first N9ca7abeb9f0945b882b41d00a623393b
84 rdf:rest rdf:nil
85 Ne57c6c8a9b7d4802a964c3afe910e503 schema:familyName Quisquater
86 schema:givenName Jean-Jacques
87 rdf:type schema:Person
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
92 schema:name Artificial Intelligence and Image Processing
93 rdf:type schema:DefinedTerm
94 sg:person.012771236207.08 schema:affiliation grid-institutes:grid.89485.38
95 schema:familyName Gilbert
96 schema:givenName Henri
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08
98 rdf:type schema:Person
99 grid-institutes:grid.89485.38 schema:alternateName France Télécom, CNET DTL-SSR, 38-40 Rue du Général Leclerc, 92131, Issy les Moulineaux, France
100 schema:name France Télécom, CNET DTL-SSR, 38-40 Rue du Général Leclerc, 92131, Issy les Moulineaux, France
101 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...