Abstract
In this paper we report on the performance of the RSA variants of Brands protocols for zero-knowledge proof and restrictive blinded issuingĀ . The performance is relatively bad: For 4 attributes and an RSA key size of 1280 bits, blinded issuing takes about 10 seconds and the zero-knowledge proof takes about 9 seconds. For 2 attributes the zero-knowledge proof drops to 5 seconds. The poor performance comes from the fact that the cryptographic coprocessor on the Java card can only be employed in very limited ways. With appropriate support of the cryptographic coprocessor both protocols would run much faster.
Chapter PDF
Similar content being viewed by others
References
Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000), www.credentica.com
Dowling, T., Duffy, A.: Java card key generation for identity based systems. Technical Report NUIM-CS-TR-2005-01, Department of Computer Science, National University of Ireland, Maynooth (February 2005), http://www.cs.nuim.ie/research/reports/2005
Elo, T., Nikander, P.: Decentralized authorization with ECDSA on a Java smart card. In: Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications, Norwell, MA, USA, pp. 345ā364. Kluwer Academic Publishers, Dordrecht (2001)
Garcia, F., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.Ā 5283, pp. 97ā114. Springer, Heidelberg (2008)
Garcia, F.D., van Rossum, P., Verdult, R., Schreur, R.W.: Wirelessly pickpocketing a Mifare Classic card. In: IEEE Symposium on Security and Privacy (S&P 2009), pp. 3ā15. IEEE, Los Alamitos (2009)
Lenstra, A.: Key lengths. In: Bidgoli, H. (ed.) Handbook of Information Security. Information Warfare, Social, Legal, and International Issues and Security Foundations, vol.Ā II, pp. 617ā635. Wiley, Chichester (2006)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001)
SUN Microsystems. Java Card v2.2.1 API (2003), http://java.sun.com/javacard/specs.html
SUN Microsystems. Java Card v2.2.2 API (2005), http://java.sun.com/javacard/specs.html
SUN Microsystems. Java Card Specifications Version 3.0 (2008), http://java.sun.com/javacard/downloads/
Nohl, K., Evans, D., Starbug, S., Plƶtz, H.: Reverse-engineering a cryptographic RFID tag. In: 17th USENIX Security Symposium, San Jose, CA, USA, pp. 185ā194 (2004)
Smart, N.P.: Elliptic curve based protocols. In: Blake, I.F., Seroussi, G., Smart, N.P. (eds.) Advances in Elliptic Curve Cryptography. LMS, vol.Ā 317, pp. 3ā19. Cambridge Univ. Press, Cambridge (2005)
Verheul, E.R.: Self-blindable credential certificates from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.Ā 2248, pp. 533ā550. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Tews, H., Jacobs, B. (2009). Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card. In: Markowitch, O., Bilas, A., Hoepman, JH., Mitchell, C.J., Quisquater, JJ. (eds) Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. WISTP 2009. Lecture Notes in Computer Science, vol 5746. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03944-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-03944-7_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03943-0
Online ISBN: 978-3-642-03944-7
eBook Packages: Computer ScienceComputer Science (R0)