In-depth Analysis of the Security Mechanism for Extended Access Control of Electronic Documents
More and more countries are beginning to use electronic certificates, which store fingerprints, irises and other private data, and require a reliable authorization control mechanism to ensure the security of personal information.The extended access control (EAC) mechanism published by ICAO is efficient and secure, but the process is complex and difficult to grasp.In order to popularize EAC, the work flow is deeply analyzed, and the key and difficult points of EAC are elaborated in detail, which reduces the difficulty of application and is beneficial to the large-scale popularization.
Electronic credentials Sensitive private data Extended access control (EAC) Key exchange algorithms
Jian SUN Yong-ling FU Sheng-guang LI Wen-peng XU Lin TAN
School of Mechanical Engineering & Automation, Beihang University, Beijing 100191, China;The F.R.I.o School of Mechanical Engineering & Automation, Beihang University, Beijing 100191, China The F.R.I.of Ministry of Public Security, Beijing 100048, China
国际会议
上海
英文
439-445
2018-04-15(万方平台首次上网日期,不代表论文的发表时间)