Abstract
This document describes a new cryptographic protocol that allows the efficient authentication of an unlimited amount of data coming from an IC Card by an off-line terminal where the IC Card’s cryptographic capability is limited to computing one-way functions and MACs. The authentication of the IC Card and its data are based on a Challenge-Response protocol using one-way functions. The protocol is especially suited for use in off-line electronic purse payments in an interoperable environment, where sharing of secret keys between different institutions is not allowed. It is also suited for off-line debit/credit payment applications. The protocol, when applied for purse payments or debit/credit allows transaction timings of the order of 1 second if implemented on currently mass-produced IC Cards.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)
Lamport, L.: Constructing digital signatures from a one-way function, Technical report, CSL-98, SRI International, Palo Alto (1979)
EMV 1996, Europay International S.A., Master-Card International Incorporated, VISA International Service Association: IC Card Specification for Payment Systems, version 3.0, (June 1996); Including the Errata Version 1.0 (January 31, 1998)
prEN 1546 Identification card systems -Inter-sector electronic purse: prEN 1546-1: Definitions, concepts and structures (March 1995), prEN 1546-2: Security architecture (January 1996), prEN 1546-3: Data elements and interchanges (December 1996)
ECBS TCD 110-1, 2, 3, 4, 5, draft European Banking Standard for Interoperable financial sector Electronic Purse (April 1998)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dawirs, M., Daemen, J. (2000). The Banksys Signature Transport (BST) Protocol. In: Quisquater, JJ., Schneier, B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10721064_4
Download citation
DOI: https://doi.org/10.1007/10721064_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67923-3
Online ISBN: 978-3-540-44534-0
eBook Packages: Springer Book Archive