Dedicated Hardware for Attribute-Based Credential Verification

被引:0
|
作者
Ottoy, Geoffrey [1 ]
Lapon, Jorn [2 ]
Naessens, Vincent [2 ]
Preneel, Bart [3 ]
De Strycker, Lieven [1 ]
机构
[1] KAHO Sint Lieven, DraMCo Res Grp, Gebroeders Smetstr 1, B-9000 Ghent, Belgium
[2] KAHO Sint Lieven, MSEC Res Grp, B-9000 Ghent, Belgium
[3] Katholieke Univ Leuven, COSIC & IBT, B-3001 Heverlee, Belgium
来源
COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013 | 2013年 / 8099卷
关键词
attribute-based credentials; dedicated hardware; embedded; NFC; MONTGOMERY MODULAR EXPONENTIATION; ANONYMOUS CREDENTIALS; SCALABLE ARCHITECTURE; MULTIPLICATION; PARALLEL; SCHEME;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based credentials systems offer a privacy-friendly solution to access electronic services. In this field, most research has been directed into optimizing the prover operations and exploring the usability boundaries on mobile platforms like smart cards and mobile phones. This research assumes that the verification of credential proofs occur at a powerful back end. However, a broad range of (embedded) applications lack this powerful back end. This article shows that hardware accelerators for modular exponentiations, greatly reduce the run time of applications that require credential verification in an embedded context. In addition, when verification requires a considerable amount of the total run time (i.e., communication included), the use of dual-base (simultaneous) exponentiation hardware further increases the overall performance. All tests have been performed in a practical setup between a smart-phone and an embedded terminal using NFC communication.
引用
收藏
页码:50 / 65
页数:16
相关论文
共 50 条
  • [41] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    SENSORS, 2019, 19 (07)
  • [42] Fast revocation of attribute-based credentials for both users and verifiers
    Lueks, Wouter
    Alpar, Gergely
    Hoepman, Jaap-Henk
    Vullers, Pim
    COMPUTERS & SECURITY, 2017, 67 : 308 - 323
  • [43] A lightweight and scalable attribute-based encryption system for smart cities
    Rasori, Marco
    Perazzo, Pericle
    Dini, Gianluca
    COMPUTER COMMUNICATIONS, 2020, 149 : 78 - 89
  • [44] Key-Policy Attribute-Based Encryption Based on SM9
    Liu, Xiao-Hong
    Huang, Xin-Yi
    Wu, Wei
    Ning, Jian-Ting
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2025, 40 (01) : 267 - 282
  • [45] Secure document sharing model based on blockchain technology and attribute-based encryption
    Verma, Garima
    Kanrar, Soumen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (06) : 16377 - 16394
  • [46] Lattice-based multi-authority ciphertext-policy attribute-based searchable with attribute revocation for cloud
    Shen, Xiajiong
    Li, Xiaoran
    Yin, Hongjian
    Cao, Chaoyang
    Zhang, Lei
    COMPUTER NETWORKS, 2024, 250
  • [47] Secure digital documents sharing using blockchain and attribute-based cryptosystem
    Verma, Garima
    Kanrar, Soumen
    MULTIAGENT AND GRID SYSTEMS, 2022, 18 (3-4) : 365 - 379
  • [48] Efficient attribute-based signature and signcryption realizing expressive access structures
    Rao, Y. Sreenivasa
    Dutta, Ratna
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 81 - 109
  • [49] Privacy Protection of Task in Crowdsourcing: Policy-Hiding and Attribute Updating Attribute-Based Access Control Based on Blockchain
    Yang, Kunwei
    Yang, Bo
    Zhou, Yanwei
    Wang, Tao
    Gong, Linming
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [50] Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare
    Meng, Dacheng
    Wang, Wenbo
    Luo, Entao
    Wang, Guojun
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 178 - 189