Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card
comunitat-uji-handle:10234/9
comunitat-uji-handle2:10234/43662
comunitat-uji-handle3:10234/159451
comunitat-uji-handle4:
INVESTIGACIONEste recurso está restringido
https://dl.acm.org/doi/10.1145/3538969.3543798 |
Metadatos
Título
Implementation of Revocable Keyed-Verification Anonymous Credentials on Java CardFecha de publicación
2022Editor
Association for Computing Machinery (ACM)ISBN
9781450396707Cita bibliográfica
Raúl Casanova-Marqués, Petr Dzurenda, and Jan Hajny. 2022. Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card. In The 17th International Conference on Availability, Reliability and Security (ARES 2022), August 23–26, 2022, Vienna, Austria. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3538969.3543798Tipo de documento
info:eu-repo/semantics/conferenceObjectVersión de la editorial
https://dl.acm.org/doi/10.1145/3538969.3543798Versión
info:eu-repo/semantics/publishedVersionPalabras clave / Materias
Resumen
Java Card stands out as a good choice for the development of smart
card applications due to the high interoperability between different
manufacturers, its security, and wide support of cryptographic algorithms. ... [+]
Java Card stands out as a good choice for the development of smart
card applications due to the high interoperability between different
manufacturers, its security, and wide support of cryptographic algorithms. Despite extensive cryptographic support, current Java Cards
do not support non-standard cryptographic algorithms such as postquantum, secure-multiparty computations, and privacy-enhancing
cryptographic schemes. Moreover, Java Card is restricted by the
Application Programming Interface (API) in algebraic operations,
which are the foundation of modern cryptographic schemes. This
paper addresses the issue of developing these modern schemes
by exploiting the limited cryptographic API provided by these
types of cards. We show how to (ab)use the Java Card’s API to
perform modular arithmetic operations, as well as basic operations
on elliptic curves. Furthermore, we implement an attribute-based
privacy-enhancing scheme on an off-the-shelf Java Card. To do so,
we use our cryptographic API and several optimization techniques
to make the scheme as efficient as possible. To demonstrate the
practicality of our solution, we present the implementation results
and benchmark tests. [-]
Descripción
Ponència presentada en ARES '22. 17th International Conference on Availability, Reliability and Security
Publicado en
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityEntidad financiadora
European Comission | Ministry of the Interior of the Czech Republic
Código del proyecto o subvención
info:eu-repo/grantAgreement/EC/H2020/813278 | VJ01030002
Derechos de acceso
© 2022 Association for Computing Machinery.
http://rightsstatements.org/vocab/InC/1.0/
info:eu-repo/semantics/restrictedAccess
http://rightsstatements.org/vocab/InC/1.0/
info:eu-repo/semantics/restrictedAccess