Beyond Parasitic Authentication
Resumo
Parasitic authentication [Ebringer et al., 2000] is a novel approach for user authentication in electronic wallet systems which combines security and usability. We propose an extension to parasitic authentication that integrates it to payment protocols thus increasing the security of electronic wallets. The additional security comes at the expense of greater complexity in the secondary devices used in the authentication process.
Referências
Ebringer, T., Thorne, P., and Zheng, Y. (2000). Parasitic authentication to protect your e-wallet. IEEE Computer, 33(10):54–60.
Ferreira, L. C. and Dahab, R. (1998). Formal analysis of a model for electronic payment systems. In I Workshop Brasileiro de Métodos Formais, pages 141–145.
Hernández, J. C. L. (2000). Implementação Eficiente Em Software de Criptossistemas de Curvas Elípticas. PhD thesis, Instituto de Computação - Unicamp. Most text in English.
Leung, K. H., Ma, K.W., Wong, W. K., and Leong, P.W. (2000). FPGA implementation of a microcoded elliptic curve cryptographic processor. In IEEE FCCM’2000.
Menezes, A. J., Oorschot, P. C., and Vanstone, S. A. (1997). Handbook of Apllied Cryptography. CRC Press. Available online at http://www.cacr.uwaterloo.ca/hac.
Orlando, G. and Paar, C. (2000). A high-performance reconfigurable elliptic curve processor for GF(2m). In CHES’2000,Worcester MA, USA.
Rabaey, J. M., Ammer, M. J., Jr., J. L. D. S., Patel, D., and Roundy, S. (2000). PicoRadio supports ad hoc ultra-low power wireless networking. IEEE Computer, 33(7):42–48.
Schnorr, C. P. (1990). Efficient indentification and signatures for smart cards. In Brassard, G., editor, Advances in Cryptology: Proceedings of CRYPTO’89 (LNCS 435), pages 239–252. Springer Verlag.
Zimmerman, T. G. (1996). Personal area networks: Near-field intrabody communication. IBM Systems Journal, 35(3,4):609–617.