Electronic ticketing: a smartcard application case-study
- The electronic ticketing was developed within the scope of the Go!Card project. It is used as a test object for the techniques for the development of secure smartcard applications that are developed in the Go!Card project. Our development method for secure smartcard applications is described in [D. Haneberg, W. Reif, K. Stenzel: A Method for Secure Smartcard Applications, in: Algebraic Methodology and Software Technology, LNCS 2422, Springer]. The electronic ticketing case study deals with an e-commerce scenario for the electronic sale of railway or flight tickets. The customers buy their tickets from a server that transmits the signed and encrypted tickets to the customer, where they are loaded on the customers smartcard. Then the smartcard decrypts and verifies the tickets and stores them. The tickets are checked and obliterated offline by the train's conductor using a portable computer. This report describes the scenario of the electronic ticketing case study, we explain theThe electronic ticketing was developed within the scope of the Go!Card project. It is used as a test object for the techniques for the development of secure smartcard applications that are developed in the Go!Card project. Our development method for secure smartcard applications is described in [D. Haneberg, W. Reif, K. Stenzel: A Method for Secure Smartcard Applications, in: Algebraic Methodology and Software Technology, LNCS 2422, Springer]. The electronic ticketing case study deals with an e-commerce scenario for the electronic sale of railway or flight tickets. The customers buy their tickets from a server that transmits the signed and encrypted tickets to the customer, where they are loaded on the customers smartcard. Then the smartcard decrypts and verifies the tickets and stores them. The tickets are checked and obliterated offline by the train's conductor using a portable computer. This report describes the scenario of the electronic ticketing case study, we explain the different functions and discuss desirable security objectives. This report completely supersedes Technical Report 2001-9 which now is obsolete. The design and the description of the protocols were adjusted to the latest findings of our research and some additional protocols were added.…

