Skip to main content

The Banksys Signature Transport (BST) Protocol

  • Conference paper
Smart Card Research and Applications (CARDIS 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1820))

  • 1293 Accesses

Abstract

This document describes a new cryptographic protocol that allows the efficient authentication of an unlimited amount of data coming from an IC Card by an off-line terminal where the IC Card’s cryptographic capability is limited to computing one-way functions and MACs. The authentication of the IC Card and its data are based on a Challenge-Response protocol using one-way functions. The protocol is especially suited for use in off-line electronic purse payments in an interoperable environment, where sharing of secret keys between different institutions is not allowed. It is also suited for off-line debit/credit payment applications. The protocol, when applied for purse payments or debit/credit allows transaction timings of the order of 1 second if implemented on currently mass-produced IC Cards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  2. Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)

    Google Scholar 

  3. Lamport, L.: Constructing digital signatures from a one-way function, Technical report, CSL-98, SRI International, Palo Alto (1979)

    Google Scholar 

  4. EMV 1996, Europay International S.A., Master-Card International Incorporated, VISA International Service Association: IC Card Specification for Payment Systems, version 3.0, (June 1996); Including the Errata Version 1.0 (January 31, 1998)

    Google Scholar 

  5. prEN 1546 Identification card systems -Inter-sector electronic purse: prEN 1546-1: Definitions, concepts and structures (March 1995), prEN 1546-2: Security architecture (January 1996), prEN 1546-3: Data elements and interchanges (December 1996)

    Google Scholar 

  6. ECBS TCD 110-1, 2, 3, 4, 5, draft European Banking Standard for Interoperable financial sector Electronic Purse (April 1998)

    Google Scholar 

  7. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dawirs, M., Daemen, J. (2000). The Banksys Signature Transport (BST) Protocol. In: Quisquater, JJ., Schneier, B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10721064_4

Download citation

  • DOI: https://doi.org/10.1007/10721064_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67923-3

  • Online ISBN: 978-3-540-44534-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics