Abstract
The Internet of Things (IoT), in spite of its innumerable advantages, brings many challenges namely issues about users’ privacy preservation and constraints about lightweight cryptography. Lightweight cryptography is of capital importance since IoT devices are qualified to be resource-constrained. To address these challenges, several Attribute-Based Credentials (ABC) schemes have been designed including I2PA, U-prove, and Idemix. Even though these schemes have very strong cryptographic bases, their performance in resource-constrained devices is a question that deserves special attention. Therefor, this paper aims to conduct a performance evaluation of these schemes on issuance and verification protocols regarding memory usage and computing time. Recorded results show that both I2PA and U-prove present very interesting results regarding memory usage and computing time while Idemix presents very low performance with regard to computing time compared to I2PA and U-prove.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, Y.-K.: Challenges and opportunities of internet of things, pp. 383–388, January 2012. https://doi.org/10.1109/ASPDAC.2012.6164978
Ashton, K.: That “Internet of Things” Thing (2009). https://tools.ietf.org/html/draft-josefsson-eddsa-ed25519-03. Accessed 28 June 2019
Mattern, F., Floerkemeier, C.: From the internet of computers to the internet of things. In: Sachs, K., Petrov, I., Guerrero, P. (eds.) From Active Data Management to Event-Based Systems and More. LNCS, vol. 6462, pp. 242–259. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-17226-7_15
Sene, I., Ciss, A.A., Niang, O.: I2PA: an efficient ABC for IoT. Cryptography 3(2), 16 (2019). https://doi.org/10.3390/cryptography3020016
Toumia, A., Szoniecky, S.: Prétopologie et protection de la vie privée dans l’Internet des Objets. Open Science-Internet des objets 2(1) (2018)
Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21–30. ACM (2002)
Paquin, C., Zaverucha, G.: U-prove cryptographic specification v1. 1. Technical report, Microsoft Corporation (2011)
Alpár, G., Jacobs, B.: Credential design in attribute-based identity management (2013)
Alpár, G.: Attribute-based identity management: [bridging the cryptographic design of ABCs with the real world]. [Sl: sn] (2015)
Ciss, A.A.: Trends in elliptic curves cryptography. IMHOTEP: Afr. J. Pure Appl. Math. 2(1), 1–12 (2015)
Josefsson, S., Liusvaara, I.: Edwards-curve digital signature algorithm (EDDSA). Technical report (2017)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). https://doi.org/10.1007/3-540-39799-X_31
Rivain, M.: Fast and regular algorithms for scalar multiplication over elliptic curves. IACR Cryptology ePrint Archive, p. 338 (2011)
Baldimtsi, F., Lysyanskaya, A.: Anonymous credentials light. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1087–1098. ACM (2013)
Camenisch, J., Groß, T.: Efficient attributes for anonymous credentials. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(1), 4 (2012)
Veseli, F., Serna, J.: Evaluation of privacy-ABC technologies - a study on the computational efficiency. In: Habib, S.M.M., Vassileva, J., Mauw, S., Mühlhäuser, M. (eds.) IFIPTM 2016. IAICT, vol. 473, pp. 63–78. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41354-9_5
Veseli, F., Olvera, J.S.: Benchmarking privacy-ABC technologies - an evaluation of storage and communication efficiency, pp. 198–205, June 2015. https://doi.org/10.1109/SERVICES.2015.37
Vullers, P., Alpár, G.: Efficient selective disclosure on smart cards using idemix. In: Fischer-Hübner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IAICT, vol. 396, pp. 53–67. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37282-7_5
Mostowski, W., Vullers, P.: Efficient U-prove implementation for anonymous credentials on smart cards. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 243–260. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31909-9_14
Liu, Z., Seo, H., Xu, Q.: Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes. Secur. Commun. Netw. 8(18), 3301–3310 (2015)
El Housni, Y.: Edwards curves. Working Paper or Preprint, December 2018. https://hal.archives-ouvertes.fr/hal-01942759
IANIX. Things that use Ed25519 (2019). https://ianix.com/pub/ed25519-deployment.html. Accessed 25 Jan 2019
Sinha, R., Srivastava, H.K., Gupta, S.: Performance based comparison study of RSA and elliptic curve cryptography. Int. J. Sci. Eng. Res. 4(5), 720–725 (2013)
Sedlacek, J., Hurka, T.: VisualVM, All-in-One Java Troubleshooting Tool (2017). https://visualvm.github.io/. Accessed 05 Mar 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Sene, I., Ciss, A.A., Niang, O. (2020). I2PA, U-prove, and Idemix: An Evaluation of Memory Usage and Computing Time Efficiency in an IoT Context. In: Zitouni, R., Agueh, M., Houngue, P., Soude, H. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 311. Springer, Cham. https://doi.org/10.1007/978-3-030-41593-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-41593-8_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-41592-1
Online ISBN: 978-3-030-41593-8
eBook Packages: Computer ScienceComputer Science (R0)