SLIDE 1
About Machine-Readable Travel Documents
Privacy Enhancement Using (Weakly) Non-Transferable Data Authentication
Jean Monnerat1⋆, Serge Vaudenay2, and Martin Vuagnoux2
1 UCSD, San Diego CA, USA 2 EPFL, Lausanne, Switzerland
http://lasecwww.epfl.ch Abstract Passports are now equipped with RFID chips that contain private information, biometric data, and a digital signature by issuing authorities. We review most of applicable security and privacy issues. We argue that the main privacy issue is not unauthorized access through radio channel or data skimming as claimed before, but rather the leakage of a digital signature by government authorities for private data. To fix this, we rather need the e-passport to prove the knowledge of a valid signature in a non-transferable way. Besides, several identification protocols such as GPS identification in RFID could lead to challenge seman- tics attacks that are privacy threats. To fix this, we also need some kind of non-transferability. In 2003, Steinfeld et al. proposed the universal designated-verifier signature (UDVS) primitive. Its drawback is in demanding verifiers to have public keys authenticated by the passport. One compromise was proposed by Baek et al. with the UDVSP primitive. We show that UDVSP does not provide non-transferability and fix it by using zero-knowledge proof of knowledge. We propose a simple method to protect Σ-protocols against offline Mafia fraud and challenge semantics. We apply this by proposing a simple protocol based on Guillou-Quisquater identification that only requires two RSA computations and would substantially enhance the privacy of the e-passport bearer.
1 Introduction
So far, the travel documents we are familiar with are based on low technology: hard-to-copy/forge printed paper with an ID picture. The UN International Civil Aviation Organization (ICAO) has been working on making them machine readable since 1968. There is now a discrete machine-readable zone (MRZ) which can be optically scanned by a machine. This MRZ contains little information and is mostly aimed at speeding up inspection at border controls. Since 1980, ICAO works on adding more machine-readable information. In particular, biometrics would be used to have a more automatic and secure people identification protocol. The standard was released in 2004. As minimal requirements, Machine-Readable Travel Documents (MRTD) must provide a facial image, a digital copy of the MRZ, and to have them digitally signed by the issuing country. The preferred platform is a contactless IC chip based on RFID technology. Obviously, the goal of this effort is to strengthen security at border controls. Of course, one danger would be that security officers rely too much on automatic identification and control. This would be counterproductive for security since passport copies of low quality with clones of IC chips would pass security control more easily. At the same time, the use of embedded digital biometric data opens the Pandora box and could threaten humankind: machines would trace people and humans would have to fight very hard against errors in databases or machine errors. For instance, the advent of video surveillance together with automatic face recognition jeopardizes the legitimate right to stay anonymous in a crowd. More dramatically, if criminal organizations can no longer steal identities without genuine fingers, they will start cutting fingers. This is what happened with biometric car lock systems.
⋆ Supported by a fellowship of the Swiss National Science Foundation, PBEL2–116915