Dedicated Hardware for Attribute-Based Credential Verification

被引:0
|
作者
Ottoy, Geoffrey [1 ]
Lapon, Jorn [2 ]
Naessens, Vincent [2 ]
Preneel, Bart [3 ]
De Strycker, Lieven [1 ]
机构
[1] KAHO Sint Lieven, DraMCo Res Grp, Gebroeders Smetstr 1, B-9000 Ghent, Belgium
[2] KAHO Sint Lieven, MSEC Res Grp, B-9000 Ghent, Belgium
[3] Katholieke Univ Leuven, COSIC & IBT, B-3001 Heverlee, Belgium
关键词
attribute-based credentials; dedicated hardware; embedded; NFC; MONTGOMERY MODULAR EXPONENTIATION; ANONYMOUS CREDENTIALS; SCALABLE ARCHITECTURE; MULTIPLICATION; PARALLEL; SCHEME;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based credentials systems offer a privacy-friendly solution to access electronic services. In this field, most research has been directed into optimizing the prover operations and exploring the usability boundaries on mobile platforms like smart cards and mobile phones. This research assumes that the verification of credential proofs occur at a powerful back end. However, a broad range of (embedded) applications lack this powerful back end. This article shows that hardware accelerators for modular exponentiations, greatly reduce the run time of applications that require credential verification in an embedded context. In addition, when verification requires a considerable amount of the total run time (i.e., communication included), the use of dual-base (simultaneous) exponentiation hardware further increases the overall performance. All tests have been performed in a practical setup between a smart-phone and an embedded terminal using NFC communication.
引用
收藏
页码:50 / 65
页数:16
相关论文
共 50 条
  • [41] Attribute-based signatures on lattices
    Xie Jia
    Hu Yupu
    Gao Juntao
    Gao Wen
    Li Xuelian
    [J]. The Journal of China Universities of Posts and Telecommunications, 2016, (04) : 83 - 90
  • [42] Attribute-based signatures on lattices
    Xie Jia
    Hu Yupu
    Gao Juntao
    Gao Wen
    Li Xuelian
    [J]. The Journal of China Universities of Posts and Telecommunications., 2016, 23 (04) - 90
  • [43] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [44] Hierarchical Attribute-Based Signatures
    Dragan, Constantin-Catalin
    Gardham, Daniel
    Manulis, Mark
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 213 - 234
  • [45] Attribute-Based Signature on Lattices
    毛贤平
    陈克非
    龙宇
    王亮亮
    [J]. Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 406 - 411
  • [46] A Calculus for Attribute-based Communication
    Abd Alrahman, Yehia
    De Nicola, Rocco
    Loreti, Michele
    Tiezzi, Francesco
    Vigo, Roberto
    [J]. 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 1840 - 1845
  • [47] Traceable attribute-based signcryption
    Wei, Jianghong
    Hu, Xuexian
    Liu, Wenfen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2302 - 2317
  • [48] Distributed Attribute-Based Encryption
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 20 - 36
  • [49] Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management
    Palomar, Esther
    Gonzalez-Manzano, Lorena
    Alcaide, Almudena
    Galan, Alvaro
    [J]. IET INFORMATION SECURITY, 2016, 10 (02) : 60 - 68
  • [50] Attribute attribute-based clustering for product family design
    Ye, Xiaoli
    Gershenson, John K.
    [J]. 19TH INTERNATIONAL CONFERENCE ON DESIGN THEORY AND METHODOLOGY/1ST INTERNATIONAL CONFERENCE ON MICRO AND NANO SYSTEMS, VOL 3, PART A AND B, 2008, : 353 - 361