Abstract

Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tends to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. This paper also demonstrates the feasibility of using finite-state machines as a formal method to analyse the proposed protocols. Finally we showed how Petri Nets could be used to simulate the communication patterns between the server and client as well as to validate the protocol functionality.

Highlights

  • Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties

  • While e-government provides a number of advantages, it introduces a range of new security risks

  • We propose a biometric-ID-based scheme using Elliptic Curve Cryptosystem (ECC), which is an improved combination scheme derived from two schemes [10, 11]

Read more

Summary

INTRODUCTION

E-Government mainly acts as a communication bridge, whether from government to citizen, government to government, or government to business, in efficient and reliable ways through effective use of information technology. A variant of public key cryptography that derives public keys directly from unique identity information (such as an e-mail address) known by the user is called Identity-Based Cryptography (IBC) This approach has recently received considerable attention from researchers [5, 6, 7, 8, 9], as the development of ID-Based Cryptography offers great flexibility and obviates the requirement for user certificates, since the identity of the user can be transformed into encryption keys and used for authentication. To develop a new secure cryptosystem for e-Government, several schemes were investigated to determine which protocol would be suitable for the research.

REVIEW OF RELATED WORK
PROPOSED SCHEME
Registration Phase
Login Phase
Authentication Phase
Server FSM
Client FSM
PROTOCOL MODEL AND PETRI NETS
Reachability
Boundedness and safeness
Liveness
SECURITY ANALYSIS AND COMPARISIONS
CONCLUSION AND FUTURE WORK
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.