IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card
View Sample PDF
Author(s): Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia and Kingston University, UK), Kenan Kalajdzic (Center for Computing Education, Bosnia and Herzegovina), Laleh Golafshan (Department of Computer Engineering and IT, Science and Research Branch, Islamic Azad University, Fars, Iran) and Mona Taghavi (Department of Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran)
Copyright: 2011
Volume: 5
Issue: 3
Pages: 18
Source title: International Journal of Information Security and Privacy (IJISP)
Editor(s)-in-Chief: Michele Tomaiuolo (University of Parma, Italy) and Monica Mordonini (University of Parma, Italy)
DOI: 10.4018/ijisp.2011070101

Purchase

View Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card on the publisher's website for pricing and purchasing information.

Abstract

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card application developers with a reliable authentication mechanism based on well-known zero-knowledge authentication schemes. Java Card is used as the target smart card platform implementation based on the evaluation of the Fiat-Shamir (F-S) and Guillou-Quisquater (G-Q) protocols under various performance criteria are presented to show the effectiveness of the implementation and that G-Q is a more efficient protocol.

Related Content

Analyzing Online Customer Satisfaction: The Impacts of Perceived Benefits, Perceived Risks, and Trust
Jennifer H. Gao. © 2019. 12 pages.
View Details View Details PDF Full Text View Sample PDF
Integration Stages of Project Risk Management (PRM) into Enterprise Risk Management (ERM)
Ruchi Agarwal, Lev Virine. © 2019. 21 pages.
View Details View Details PDF Full Text View Sample PDF
Economic Decision Making and Risk Management: How They Can Relate
Brian J. Galli. © 2019. 25 pages.
View Details View Details PDF Full Text View Sample PDF
Firm Value and Self-Insurance: Evidence from Manufacturers in California
Mu-Sheng Chang, Hsin-Hui Chiu, Yanbo Jin. © 2019. 15 pages.
View Details View Details PDF Full Text View Sample PDF
Technical Report: A Visit on Coca-Cola Happiness Factory in Greater Noida
Neel Rai, Shivani Agarwal. © 2019. 5 pages.
View Details View Details PDF Full Text View Sample PDF
Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm
Oshin Sharma, Hemraj Saini. © 2019. 16 pages.
View Details View Details PDF Full Text View Sample PDF
Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence
Yerra Shankar Rao, Prasant Kumar Nayak, Hemraj Saini, Tarini Charana Panda. © 2019. 13 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom