Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers

09/03/2018
by   Stefan Marksteiner, et al.
0

In order to counter forgeries of tickets for public transport or mass events, a method to validate them, using printed unique random pattern markers was developed. These markers themselves are unforgeable by their physically random distribution. To assure their authenticity, however, they have to be cryptographically protected and equipped with an environment for successful validation, combining physical and cyber security protection. This paper describes an architecture for cryptographically protecting these markers, which are stored in Aztec codes on physical tickets, in order to assure that only an authorized printer can generate a valid Aztec code of such a pattern, thus providing forge protection in combination with the randomness and uniqueness of the pattern. Nevertheless, the choice of the signature algorithm is heavily constrained by the sizes of the pattern, ticket provider data, metadata and the signature confronted by the data volume the code hold. Therefore, this paper also defines an example for a signature layout for the proposed architecture. This allows for a lightweight ticket validation system that is both physically and cryptographically secured to form a smart solution for mass access verification for both shorter to longer periods at relatively low cost.

READ FULL TEXT
research
01/11/2023

Secure access system using signature verification over tablet PC

Low-cost portable devices capable of capturing signature signals are bei...
research
11/01/2017

A New Signature Scheme Based on Punctured Reed--Muller Code With Random Insertion

In this paper, we propose a new signature scheme based on a punctured Re...
research
09/04/2018

User-centric Privacy Engineering for the Internet of Things

User privacy concerns are widely regarded as a key obstacle to the succe...
research
08/10/2018

Distinctiveness, complexity, and repeatability of online signature templates

This paper proposes three measures to quantify the characteristics of on...
research
07/28/2023

PUF Probe: A PUF-based Hardware Authentication Equipment for IEDs

Intelligent Electronic Devices (IEDs) are vital components in modern ele...
research
10/28/2020

On the Failure of the Smart Approach of the GPT Cryptosystem

This paper describes a new algorithm for breaking the smart approach of ...
research
02/01/2018

Attacking the Nintendo 3DS Boot ROMs

We demonstrate attacks on the boot ROMs of the Nintendo 3DS in order to ...

Please sign up or login with your details

Forgot password? Click here to reset