Open Access Open Access  Restricted Access Subscription Access

Sharing Without Disclosing:Analysis on the Protocols


Affiliations
1 School of Electrical and Information Technology, WITS University, South Africa
2 Tata Consultancy Services
 

In many of today's business and government identity programs, smart cards based application are becoming more prevalent strong cryptographic algorithm are needed to protect the data stored on the card. Smart card with embedded microcontroller has outstanding property to securely store the data and to perform the on-card functions like encryption and digital signature. In many applications it is important to share information without exposing private details. In this paper we will find ways to protect data while also allowing it to be compared with other party.

Keywords

Cryptography, Erasures, Smart Cards, Secure Computation, Sharing Data.
User
Notifications
Font Size

Abstract Views: 130

PDF Views: 0




  • Sharing Without Disclosing:Analysis on the Protocols

Abstract Views: 130  |  PDF Views: 0

Authors

Azra Siddiqui
School of Electrical and Information Technology, WITS University, South Africa
Shumail Ahmad Siddiqui
Tata Consultancy Services

Abstract


In many of today's business and government identity programs, smart cards based application are becoming more prevalent strong cryptographic algorithm are needed to protect the data stored on the card. Smart card with embedded microcontroller has outstanding property to securely store the data and to perform the on-card functions like encryption and digital signature. In many applications it is important to share information without exposing private details. In this paper we will find ways to protect data while also allowing it to be compared with other party.

Keywords


Cryptography, Erasures, Smart Cards, Secure Computation, Sharing Data.