Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card

نویسندگان

  • Ahmed Patel
  • Kenan Kalajdzic
  • Laleh Golafshan
چکیده

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card application developers with a reliable authentication mechanism based on well-known zero-knowledge authentication schemes. Java Card is used as the target smart card platform implementation based on the evaluation of the Fiat-Shamir (F-S) and Guillou-Quisquater (G-Q) protocols under various performance criteria are presented to show the effectiveness of the implementation and that G-Q is a more efficient protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Privacy Framework within the Java Data Security Framework (JDSF): Design Refinement, Implementation, and Statistics

We present a refinement design of something we call a Confidentiality Framework, which is a part of a more general formation, that we refer to as a Java Data Security Framework (JDSF), a workin-progress designed to support various aspects that are related to data security (confidentiality, origin authentication, integrity, etc. where this paper only focuses on the confidentiality aspect). The d...

متن کامل

Research and Implementation of ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device

IST is abbreviated from ID-based encryption scheme based on symmetric-key technique with a trusted device. IST scheme is differ from conventional security technical theory by unifying authentication and powerful encryption. In this scheme, users can encrypt their file by using identity information, and exchange any key is not necessary. The aim of this paper is to implement an IST scheme by usi...

متن کامل

Secure Object Sharing Development Kit for Java Card

Nowadays, Java Card platform-based Smart Cards are multi-application and support interapplet collaboration. The Java Card framework enforces applet isolation by means of the applet Firewall to prevent highly sensitive data in one applet to be leaked to another. The framework provides the Shareable Interface Object mechanism to allow developers to share services through the Firewall protection. ...

متن کامل

Enhancing WLAN Security by Introducing EAP-TLS Smartcards

Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-TLS protocol in smartcards. It introduces also the Pre-SharedKey protocol (PSK), a lightweight identity authentication for access control and key calculation and distribution within WLAN security. The performance and t...

متن کامل

Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card

In this paper we report on the performance of the RSA variants of Brands protocols for zero-knowledge proof and restrictive blinded issuing [1]. The performance is relatively bad: For 4 attributes and an RSA key size of 1280 bits, blinded issuing takes about 10 seconds and the zero-knowledge proof takes about 9 seconds. For 2 attributes the zero-knowledge proof drops to 5 seconds. The poor perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJISP

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2011