A Privacy Preserving Application Acquisition Protocol

Akram, Raja Naeem, Markantonakis, Konstantinos and Mayes, Keith

(2012)

Akram, Raja Naeem, Markantonakis, Konstantinos and Mayes, Keith (2012) A Privacy Preserving Application Acquisition Protocol
In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). IEEE Computer Society Press.

Our Full Text Deposits

Full text access: Open

Full text file - 314.79 KB

Abstract

In the smart card industry, the application acquisition process involves the card issuers and application providers. During this process, the respective card issuer reveals the identity of the smart card user to the individual application providers. In certain application scenarios it might be necessary (e.g. banking and identity applications). However, with introduction of the Trusted Service Manager (TSM) architecture there might be valid cases where revealing the card user's identity is not necessary. At the moment, the secure channel protocols for traditional smart card architecture including the TSM does not preserve the privacy of the card users. In this paper, we propose a secure and trusted channel protocol that provide such feature along with satisfying the requirements of an open and dynamic environment referred as User Centric Smart Card Ownership Model (UCOM). A comparison is provided between the proposed protocol and selected smart card protocols. In addition, we provide an informal analysis along with mechanical formal analysis using CasperFDR. Finally, we provide the test implementation and performance results.

Information about this Version

This is a Submitted version
This version's date is: 1/6/2012
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/6aad11c5-e40f-3002-29e2-4172ab2b344e/3/

Item TypeBook Item
TitleA Privacy Preserving Application Acquisition Protocol
AuthorsAkram, Raja Naeem
Markantonakis, Konstantinos
Mayes, Keith
Uncontrolled KeywordsCryptography, Secure Protocol, Trusted Protocol, Smart Card, GlobalPlatform, Java Card, Application Download, Common Criteria, GlobalPlatform Consumer-Centric Model, User Centric Smart Card Ownership Model, Issuer Centric Smart Card, Privacy Preserving, CasperFDR, Performance Evaluation
DepartmentsFaculty of Science\Mathematics
Research Groups and Centres\Information Security\ Information Security Group

Identifiers

Deposited by Research Information System (atira) on 24-Jul-2012 in Royal Holloway Research Online.Last modified on 24-Jul-2012


Details