2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Download PDF

Abstract

We present a variant of the protocol stack for anonymous authentication implemented in German personal identity documents. We strengthen the system by eliminating group keys - a potential target of attack for a powerful adversary aiming to undermine Restricted Identification mechanisms. We provide a mechanism of authentication that merges Chip Authentication protocol with Restricted Identification.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles