Netinfo Security ›› 2015, Vol. 15 ›› Issue (5): 21-27.doi: 10.3969/j.issn.1671-1122.2015.05.004

Previous Articles     Next Articles

The Security Requirement and Applicable Cryptographic Techniques on Identity Cards

WU Chuan-kun()   

  1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Received:2015-04-08 Online:2015-05-10 Published:2018-07-16

Abstract:

Identity cards are often used in our normal life to identity someone. In many cases, identity cards are complementary but necessary documents: when someone tends to sell his/her real estate property, apart from showing the original certificate of the property, a valid identity card of the seller is also necessary; in the process of large amount currency withdraw from a bank account, the identity card of the withdrawer together with a valid bank card is necessary. So, in some sense, the forgery detection of many other documents can be complemented by the forgery detection of identity cards. As we know, the production of resident identity cards is a national secret; hence most people do not now know its technical detail. However, as has been shown by many instances in the information technology industry that, the information security provision via manufacturing process has great risks. So public research should be encouraged, and based on the public research outcomes, the manufacture process should combine technical means of protections. This paper tends to overview the weakness of current identity cards in detecting forgeries, discuss the security functionalities that should be possessed by identity cards, particularly by the residential identity cards, intending to explore the possibility for the cryptographic techniques to be used in identity cards, expecting to provide some reference for securer identity card production in the future.

Key words: identity card, identity-based cryptography, key management

CLC Number: