Design of a Passport Anti-forgery System Based on Digital Signature Schemes

  • Lei Shi
  • Shenghui Su
  • Zhengrong Xiang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5477)


The terrorism threat which is conducted by international terrorists who possess forged identities and passports becomes more and more serious and imminent. Traditional methods and techniques of preventing passport from forgery are not effectual enough. This paper proposes a passport anti-forgery system based on the public key signature scheme RSA. The anti-forgery system contains four modules: the passport dada edit module, passport key production module, passport signature module and passport verification module. A private key used for signing is preserved separately by an authorized issue official, and a public key used for verifying is stored into a database which a web server can access. In this way, the anti-forgery property of a passport is equivalent to the security of an adopted public key signature scheme, and the passport is bound with its issue authority tightly.


Passport anti-forgery Digital signature scheme IC chip Algorithm Client / server 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Schneier, B.: Applied Cryptography: Protocols, algorithms, and source code in C, 2nd edn. John Wiley & Sons, New York (1996)zbMATHGoogle Scholar
  3. 3.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, London (1997)zbMATHGoogle Scholar
  4. 4.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM 21(2), 12–126 (1978)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Yan, S.Y.: Number Theory for Computing, 2nd edn. Springer, New York (2002)CrossRefGoogle Scholar
  6. 6.
    Su, S., Yang, B.: The REESSE Unified Recursive Algorithm for Solving Three Computational Problems. Wuhan University Journal of Natural Sciences 12(1), 172–176 (2007)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice-Hall, New Jersey (1999)Google Scholar
  8. 8.
    Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)CrossRefzbMATHGoogle Scholar
  9. 9.
    Hemspaandra, L.A., Ogihara, M.: The Complexity Theory Companion. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  10. 10.
    Rabaey, J.M., Chandrakasan, A., Nikolic, B.: Digital Integrated Circuits, 2nd edn. Prentice-Hall, New Jersey (2002)Google Scholar
  11. 11.
    Martin, K.: Digital Integrated Circuit Design. Oxford University Press, Oxford (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Lei Shi
    • 1
  • Shenghui Su
    • 1
  • Zhengrong Xiang
    • 2
  1. 1.College of Computer ScienceBeijing University of TechnologyBeijingP.R. China
  2. 2.School of Economics & ManagementBeijing University of Posts & TelecomsBeijingP.R. China

Personalised recommendations