Dedicated Hardware for Attribute-Based Credential Verification

被引:0
|
作者
Ottoy, Geoffrey [1 ]
Lapon, Jorn [2 ]
Naessens, Vincent [2 ]
Preneel, Bart [3 ]
De Strycker, Lieven [1 ]
机构
[1] KAHO Sint Lieven, DraMCo Res Grp, Gebroeders Smetstr 1, B-9000 Ghent, Belgium
[2] KAHO Sint Lieven, MSEC Res Grp, B-9000 Ghent, Belgium
[3] Katholieke Univ Leuven, COSIC & IBT, B-3001 Heverlee, Belgium
关键词
attribute-based credentials; dedicated hardware; embedded; NFC; MONTGOMERY MODULAR EXPONENTIATION; ANONYMOUS CREDENTIALS; SCALABLE ARCHITECTURE; MULTIPLICATION; PARALLEL; SCHEME;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based credentials systems offer a privacy-friendly solution to access electronic services. In this field, most research has been directed into optimizing the prover operations and exploring the usability boundaries on mobile platforms like smart cards and mobile phones. This research assumes that the verification of credential proofs occur at a powerful back end. However, a broad range of (embedded) applications lack this powerful back end. This article shows that hardware accelerators for modular exponentiations, greatly reduce the run time of applications that require credential verification in an embedded context. In addition, when verification requires a considerable amount of the total run time (i.e., communication included), the use of dual-base (simultaneous) exponentiation hardware further increases the overall performance. All tests have been performed in a practical setup between a smart-phone and an embedded terminal using NFC communication.
引用
收藏
页码:50 / 65
页数:16
相关论文
共 50 条
  • [1] Attribute-based anonymous credential: Delegation, traceability, and revocation
    Li, Peng
    Lai, Junzuo
    Yang, Ye
    Sun, Meng
    Wu, Chi
    Wu, Wei
    Yuan, Xiaowei
    [J]. COMPUTER NETWORKS, 2023, 237
  • [2] Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
    Shahandashti, Siamak F.
    Safavi-Naini, Reihaneh
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 198 - +
  • [3] An Efficient Self-blindable Attribute-Based Credential Scheme
    Ringers, Sietse
    Verheul, Eric
    Hoepman, Jaap-Henk
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 3 - 20
  • [4] Hardware Low Power implementation of Attribute-Based Encryption
    Abdel-Aziz, Mohamed M.
    Abdel-Hamid, Amr T.
    [J]. 2016 28TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM 2016), 2016, : 273 - 276
  • [5] Attribute-Based Security Verification of Business Process Models
    Argyropoulos, Nikolaos
    Mouratidis, Haralambos
    Fish, Andrew
    [J]. 2017 IEEE 19TH CONFERENCE ON BUSINESS INFORMATICS (CBI), VOL 1, 2017, 1 : 43 - 52
  • [6] Attribute-based Server-Aided Verification Signature
    Wang, Zhiwei
    Xie, Ruirui
    Wang, Shaohui
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3183 - 3190
  • [7] An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment
    Pussewalage, Harsha S. Gardiyawasam
    Oleshchuk, Vladimir A.
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (03)
  • [8] Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use
    Chan, Kwan Yin
    Yuen, Tsz Hon
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2022, 2022, 13641 : 89 - 121
  • [9] Formal Analysis of Selective Disclosure Attribute-Based Credential System in applied Pi Calculus
    Wang, Caimei
    Xiong, Yan
    Huang, Wenchao
    Xia, Huihua
    Huang, Jianmeng
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 42 - 49
  • [10] Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems
    Au, Man Ho
    Tsang, Patrick P.
    Susilo, Willy
    Mu, Yi
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 295 - +