Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones

نویسندگان

  • Jan Hajny
  • Lukas Malina
  • Zdenek Martinasek
  • Ondrej Tethal
چکیده

The paper deals with the implementation and benchmarking of cryptographic primitives on contemporary smart-cards and smartphones. The goal of the paper is to analyze the demands of today’s common theoretical cryptographic constructions used in privacy-enhancing schemes and to find out whether they can be practically implemented on off-the-shelf hardware. We evaluate the performance of all major platforms of programmable smart-cards (JavaCards, .NET cards and MultOS cards) and three reference Android devices (a tablet and two smart-phones). The fundamental cryptographic primitives frequently used in advanced cryptographic constructions, such as user-centric attribute-based protocols and anonymous credential systems, are evaluated. In addition, we show how our results can be used for the estimation of the performance of existing and future cryptographic protocols. Therefore, we provide not only benchmarks of all modern programmable smart-card platforms but also a tool for the performance estimation of privacy-enhancing schemes which are based on popular zero-knowledge proof of knowledge protocols.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy and Security Issues in e-T icketing O ptim isation of Smart Card-based Attribute-proving

This short note concentrates on an optimisation of the attribute-proving protocol by Batina et al. [1], and provides the improved performance figures. The protocol relies on elliptic curve cryptography with bilinear pairings. These pairings provide signatures that are stable under multiplication with a blinding factor. In this way multiple proofs are unlinkable, and thus provides a privacy-frie...

متن کامل

DECENTRALIZED AUTHORIZATIONWITH ECDSA ON A JAVA SMART CARD A Software Implementation

Traditionally, smart cards have been used as secure tokens in identity based access control. That is, a smart card has been used as an intelligent storage of protected cryptographic information, such as a shared secret or a private key in a public key system. The cryptographic information is then used to prove the possession of the card in a secure way either locally or remotely over telecommun...

متن کامل

An Intrusion-tolerant e-Voting Client System

The ambition of any e-voting system is to reproduce, in an electronic environment, the characteristics of physical voting systems, such as accuracy, democracy, privacy and veri ability. REVS is an Internet e-voting system based on blind signatures and designed to be robust in distributed and faulty environments. However, the execution of REVS client system, used by voters, can be tampered by in...

متن کامل

Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards

In this paper we discuss an efficient implementation of anonymous credentials on smart cards. In general, privacy-preserving protocols are computationally intensive and require the use of advanced cryptography. Implementing such protocols for smart cards involves a trade-off between the requirements of the protocol and the capabilities of the smart card. In this context we concentrate on the im...

متن کامل

Enhancing Security in Cryptographic Smart Cards through Elliptic Curve Cryptography and Optimized Modified Matrix Encoding Algorithms

Now-a-days Cryptographic smart cards are being used for most of the online transactions in many fields. But the security and the privacy of usage of these smart cards have been threatened by various attacks to hack the passwords of the smart card users. Since, small length passwords are easily accessible to hackers, users and organizations adapt to longer passwords or to change their passwords ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013