Skip to main content

I2PA, U-prove, and Idemix: An Evaluation of Memory Usage and Computing Time Efficiency in an IoT Context

  • Conference paper
  • First Online:
e-Infrastructure and e-Services for Developing Countries (AFRICOMM 2019)

Abstract

The Internet of Things (IoT), in spite of its innumerable advantages, brings many challenges namely issues about users’ privacy preservation and constraints about lightweight cryptography. Lightweight cryptography is of capital importance since IoT devices are qualified to be resource-constrained. To address these challenges, several Attribute-Based Credentials (ABC) schemes have been designed including I2PA, U-prove, and Idemix. Even though these schemes have very strong cryptographic bases, their performance in resource-constrained devices is a question that deserves special attention. Therefor, this paper aims to conduct a performance evaluation of these schemes on issuance and verification protocols regarding memory usage and computing time. Recorded results show that both I2PA and U-prove present very interesting results regarding memory usage and computing time while Idemix presents very low performance with regard to computing time compared to I2PA and U-prove.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, Y.-K.: Challenges and opportunities of internet of things, pp. 383–388, January 2012. https://doi.org/10.1109/ASPDAC.2012.6164978

  2. Ashton, K.: That “Internet of Things” Thing (2009). https://tools.ietf.org/html/draft-josefsson-eddsa-ed25519-03. Accessed 28 June 2019

  3. Mattern, F., Floerkemeier, C.: From the internet of computers to the internet of things. In: Sachs, K., Petrov, I., Guerrero, P. (eds.) From Active Data Management to Event-Based Systems and More. LNCS, vol. 6462, pp. 242–259. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-17226-7_15

    Chapter  Google Scholar 

  4. Sene, I., Ciss, A.A., Niang, O.: I2PA: an efficient ABC for IoT. Cryptography 3(2), 16 (2019). https://doi.org/10.3390/cryptography3020016

    Article  Google Scholar 

  5. Toumia, A., Szoniecky, S.: Prétopologie et protection de la vie privée dans l’Internet des Objets. Open Science-Internet des objets 2(1) (2018)

    Google Scholar 

  6. Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21–30. ACM (2002)

    Google Scholar 

  7. Paquin, C., Zaverucha, G.: U-prove cryptographic specification v1. 1. Technical report, Microsoft Corporation (2011)

    Google Scholar 

  8. Alpár, G., Jacobs, B.: Credential design in attribute-based identity management (2013)

    Google Scholar 

  9. Alpár, G.: Attribute-based identity management: [bridging the cryptographic design of ABCs with the real world]. [Sl: sn] (2015)

    Google Scholar 

  10. Ciss, A.A.: Trends in elliptic curves cryptography. IMHOTEP: Afr. J. Pure Appl. Math. 2(1), 1–12 (2015)

    MathSciNet  Google Scholar 

  11. Josefsson, S., Liusvaara, I.: Edwards-curve digital signature algorithm (EDDSA). Technical report (2017)

    Google Scholar 

  12. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  Google Scholar 

  13. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). https://doi.org/10.1007/3-540-39799-X_31

    Chapter  Google Scholar 

  14. Rivain, M.: Fast and regular algorithms for scalar multiplication over elliptic curves. IACR Cryptology ePrint Archive, p. 338 (2011)

    Google Scholar 

  15. Baldimtsi, F., Lysyanskaya, A.: Anonymous credentials light. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1087–1098. ACM (2013)

    Google Scholar 

  16. Camenisch, J., Groß, T.: Efficient attributes for anonymous credentials. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(1), 4 (2012)

    Article  Google Scholar 

  17. Veseli, F., Serna, J.: Evaluation of privacy-ABC technologies - a study on the computational efficiency. In: Habib, S.M.M., Vassileva, J., Mauw, S., Mühlhäuser, M. (eds.) IFIPTM 2016. IAICT, vol. 473, pp. 63–78. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41354-9_5

    Chapter  Google Scholar 

  18. Veseli, F., Olvera, J.S.: Benchmarking privacy-ABC technologies - an evaluation of storage and communication efficiency, pp. 198–205, June 2015. https://doi.org/10.1109/SERVICES.2015.37

  19. Vullers, P., Alpár, G.: Efficient selective disclosure on smart cards using idemix. In: Fischer-Hübner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IAICT, vol. 396, pp. 53–67. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37282-7_5

    Chapter  Google Scholar 

  20. Mostowski, W., Vullers, P.: Efficient U-prove implementation for anonymous credentials on smart cards. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 243–260. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31909-9_14

    Chapter  Google Scholar 

  21. Liu, Z., Seo, H., Xu, Q.: Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes. Secur. Commun. Netw. 8(18), 3301–3310 (2015)

    Article  Google Scholar 

  22. El Housni, Y.: Edwards curves. Working Paper or Preprint, December 2018. https://hal.archives-ouvertes.fr/hal-01942759

  23. IANIX. Things that use Ed25519 (2019). https://ianix.com/pub/ed25519-deployment.html. Accessed 25 Jan 2019

  24. Sinha, R., Srivastava, H.K., Gupta, S.: Performance based comparison study of RSA and elliptic curve cryptography. Int. J. Sci. Eng. Res. 4(5), 720–725 (2013)

    Google Scholar 

  25. Sedlacek, J., Hurka, T.: VisualVM, All-in-One Java Troubleshooting Tool (2017). https://visualvm.github.io/. Accessed 05 Mar 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ibou Sene .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sene, I., Ciss, A.A., Niang, O. (2020). I2PA, U-prove, and Idemix: An Evaluation of Memory Usage and Computing Time Efficiency in an IoT Context. In: Zitouni, R., Agueh, M., Houngue, P., Soude, H. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 311. Springer, Cham. https://doi.org/10.1007/978-3-030-41593-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-41593-8_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-41592-1

  • Online ISBN: 978-3-030-41593-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics