Dedicated Hardware for Attribute-Based Credential Verification

被引:0
|
作者
Ottoy, Geoffrey [1 ]
Lapon, Jorn [2 ]
Naessens, Vincent [2 ]
Preneel, Bart [3 ]
De Strycker, Lieven [1 ]
机构
[1] KAHO Sint Lieven, DraMCo Res Grp, Gebroeders Smetstr 1, B-9000 Ghent, Belgium
[2] KAHO Sint Lieven, MSEC Res Grp, B-9000 Ghent, Belgium
[3] Katholieke Univ Leuven, COSIC & IBT, B-3001 Heverlee, Belgium
来源
COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013 | 2013年 / 8099卷
关键词
attribute-based credentials; dedicated hardware; embedded; NFC; MONTGOMERY MODULAR EXPONENTIATION; ANONYMOUS CREDENTIALS; SCALABLE ARCHITECTURE; MULTIPLICATION; PARALLEL; SCHEME;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based credentials systems offer a privacy-friendly solution to access electronic services. In this field, most research has been directed into optimizing the prover operations and exploring the usability boundaries on mobile platforms like smart cards and mobile phones. This research assumes that the verification of credential proofs occur at a powerful back end. However, a broad range of (embedded) applications lack this powerful back end. This article shows that hardware accelerators for modular exponentiations, greatly reduce the run time of applications that require credential verification in an embedded context. In addition, when verification requires a considerable amount of the total run time (i.e., communication included), the use of dual-base (simultaneous) exponentiation hardware further increases the overall performance. All tests have been performed in a practical setup between a smart-phone and an embedded terminal using NFC communication.
引用
收藏
页码:50 / 65
页数:16
相关论文
共 50 条
  • [31] A survey on multi-authority and decentralized attribute-based encryption
    Oberko, Prince Silas Kwesi
    Obeng, Victor-Hillary Kofi Setornyo
    Xiong, Hu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 515 - 533
  • [32] Attribute-Based Authorization Tickets for Car-to-X Communication
    Buettner, Carsten
    Huss, Sorin A.
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 234 - 242
  • [33] Secure access privilege delegation using attribute-based encryption
    Panda, Suryakanta
    Mondal, Samrat
    Das, Ashok Kumar
    Susilo, Willy
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1261 - 1276
  • [34] Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    IEEE ACCESS, 2020, 8 : 23951 - 23964
  • [35] Concepts and languages for privacy-preserving attribute-based authentication
    Camenisch, Jan
    Dubovitskaya, Maria
    Enderlein, Robert R.
    Lehmann, Anja
    Neven, Gregory
    Paquin, Christian
    Preiss, Franz-Stefan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 25 - 44
  • [36] SPCABS: Signature-Policy Comparable Attribute-Based Signatures
    Chen, Hongying
    Huang, Zhenjie
    Huang, Hui
    Guo, Yafeng
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [37] A Delegation Attack Method on Attribute-Based Signatures and Probable Solutions
    Hao, Jialu
    Wu, Wei
    Wang, Shuo
    Zhong, Xiaoge
    Chu, Guang
    Shao, Feng
    MATHEMATICS, 2023, 11 (01)
  • [38] Multiauthority Attribute-Based Encryption With Dynamic Membership From Lattices
    Zhuang, Er-Shuo
    Fan, Chun-, I
    Kuo, I-Hua
    IEEE ACCESS, 2022, 10 : 58254 - 58267
  • [39] A Partial Outsourcing Decryption of Attribute-Based Encryption for Internet of Things
    Kumar, Dilip
    Kumar, Manoj
    PROCEEDINGS OF ACADEMIA-INDUSTRY CONSORTIUM FOR DATA SCIENCE (AICDS 2020), 2022, 1411 : 271 - 281
  • [40] Attribute-Based Encryption Method for Data Privacy Security Protection
    Li, Ziqian
    He, Yeshen
    Zhang, Yiying
    Li, Siwei
    Wang, Cong
    Zhang, Xiankun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 458 - 467