Abstract
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tends to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. This paper also demonstrates the feasibility of using finite-state machines as a formal method to analyse the proposed protocols. Finally we showed how Petri Nets could be used to simulate the communication patterns between the server and client as well as to validate the protocol functionality.
Highlights
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties
While e-government provides a number of advantages, it introduces a range of new security risks
We propose a biometric-ID-based scheme using Elliptic Curve Cryptosystem (ECC), which is an improved combination scheme derived from two schemes [10, 11]
Summary
E-Government mainly acts as a communication bridge, whether from government to citizen, government to government, or government to business, in efficient and reliable ways through effective use of information technology. A variant of public key cryptography that derives public keys directly from unique identity information (such as an e-mail address) known by the user is called Identity-Based Cryptography (IBC) This approach has recently received considerable attention from researchers [5, 6, 7, 8, 9], as the development of ID-Based Cryptography offers great flexibility and obviates the requirement for user certificates, since the identity of the user can be transformed into encryption keys and used for authentication. To develop a new secure cryptosystem for e-Government, several schemes were investigated to determine which protocol would be suitable for the research.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Research in Artificial Intelligence
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.