In-depth Analysis of the Security Mechanism for Extended Access Control of Electronic Documents

Jian SUN, Yong-ling FU, Sheng-guang LI, Wen-peng XU, Lin TAN

Abstract


More and more countries are beginning to use electronic certificates, which store fingerprints, irises and other private data, and require a reliable authorization control mechanism to ensure the security of personal information. The extended access control (EAC) mechanism published by ICAO is efficient and secure, but the process is complex and difficult to grasp. In order to popularize EAC, the work flow is deeply analyzed, and the key and difficult points of EAC are elaborated in detail, which reduces the difficulty of application and is beneficial to the large-scale popularization.

Keywords


Electronic credentials, Sensitive private data, Extended access control (EAC), Key exchange algorithms


DOI
10.12783/dtcse/pcmm2018/23700

Refbacks

  • There are currently no refbacks.