Efficient Downloading and Updating Applications on Portable Devices using Authentication Trees

Consider the problem of securely downloading n application blocks B(1), B(2), ..., B(n) from an application provider to a smart card (SC) with the possibility of updating a block B(i) at a later time. In this paper we describe a scheme called Ordered Authentication Trees (OTA), which solves the problem of downloading and updating application blocks with the following properties: (1) a single signature based on an authentication tree is computed for the blocks, (2) only O(log n) additional memory is required by SC beyond the memory for the blocks themselves, (3) block B(i) can be verified as correct upon receipt at the SC, and (4) blocks can be updated in O(log n) time. All previously known solutions require O(n) memory and/or delay requirements for the download/update of n code blocks. The OTA scheme also generalizes to other portable devices that share common characteristics with smart cards.

Keywords:
Portable device, smart card, authentication tree, digital signature.

By: Luke O'Connor and Günter Karjoth

Published in: RZ3215 in 2000

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rz3215.pdf

Questions about this service can be mailed to reports@us.ibm.com .