Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card

نویسندگان

  • Hendrik Tews
  • Bart Jacobs
چکیده

In this paper we report on the performance of the RSA variants of Brands protocols for zero-knowledge proof and restrictive blinded issuing [1]. The performance is relatively bad: For 4 attributes and an RSA key size of 1280 bits, blinded issuing takes about 10 seconds and the zero-knowledge proof takes about 9 seconds. For 2 attributes the zero-knowledge proof drops to 5 seconds. The poor performance comes from the fact that the cryptographic coprocessor on the Java card can only be employed in very limited ways. With appropriate support of the cryptographic coprocessor both protocols would run much faster.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation

The use of certificates for secure transactions in smart cards requires the existence of a secure and efficient revocation protocol residing on the card. There are a number of existing protocols for online certificate validation, among which OCSP and SCVP are the most widely used. However there are not any real applications testing the efficiency of these protocols when run in a smart card, eve...

متن کامل

Privacy and Security Issues in e-T icketing O ptim isation of Smart Card-based Attribute-proving

This short note concentrates on an optimisation of the attribute-proving protocol by Batina et al. [1], and provides the improved performance figures. The protocol relies on elliptic curve cryptography with bilinear pairings. These pairings provide signatures that are stable under multiplication with a blinding factor. In this way multiple proofs are unlinkable, and thus provides a privacy-frie...

متن کامل

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card a...

متن کامل

Static program analysis of multi-applet JavaCard applications

Java Card provides a framework of classes and interfaces that hides the details of the underlying smart card interface and makes it possible to load and run on the same card several applets, from different application providers with complex trust relationships. This fact opens prospects for new business applications, but the card issuer has to secure absence of malicious or faulty card applets....

متن کامل

Verification of Cryptographic Protocols Implemented in Java Card

Cryptographic protocols are used to ensure secure communications in a hostile environment, when the decisions taken by the principals depend crucially on the authenticity and integrity of messages that they receive. Typically, when a message is received, a principal wants to be sure that this message has been created recently and in good faith for a particular purpose by the principal who claim...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009