Skip to main content

Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6163))

Abstract

Anonymity and privacy protection are very important issues for Trusted Computing enabled platforms. These topics are especially important when two platforms perform a remote attestation as specified by the Trusted Computing Group (TCG). Attestation requires a platform to prove its current platform configuration by cryptographic means. However, using common digital signature schemes requires a complex public key infrastructure and allows the verifier to track and identify the signing platform. In order to address this problem, the TCG has introduced two concepts how the anonymity of Trusted Platform Modules (TPMs), and with it the anonymity of certain platforms, can be protected. The most promising of these two concepts is the Direct Anonymous Attestation (DAA) scheme which eliminates the requirement of a remote authority but includes complex mathematical computations. In this paper, we address the question whether anonymous credential systems like DAA can be efficiently used on Java enabled platforms and resource constrained devices like mobile phones. In order to be able to investigate this situation, we developed a software library that supports the basic DAA processes setup, join, sign and verify for J2SE and J2ME based virtual machines. Although our results show that DAA can efficiently be used on desktop platforms, off-the-shelf mobile phones require some premises in order to use DAA adequately.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Trusted Computing Group - TPM Working Group: TPM Main Part 3 Commands (July 9, 2007), Specification https://www.trustedcomputinggroup.org/specs/TPM/mainP3Commandsrev103.zip (Specification version 1.2 Level 2 Revision 103)

  2. Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132–145. ACM, New York (2004)

    Chapter  Google Scholar 

  3. SUN Community process - JSR 139: J2ME(TM) Connected Limited Device Configuration (CLDC) Specification 1.1 Final Release (March 4, 2004), Specification http://jcp.org/aboutJava/communityprocess/final/jsr139/index.html

  4. Mitchell, C.: Direct Anonymous Attestation in Context. In: Trusted Computing, Professional Applications of Computing, Piscataway, NJ, USA, pp. 143–174. IEEE Press, Los Alamitos (2005)

    Google Scholar 

  5. Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard Java Card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS 2009). ACM Press, New York (2009) (to appear)

    Google Scholar 

  6. Balasch Masoliver, J.M.: Smart Card Implementation of Anonymous Credentials. Master’s thesis, K.U.Leuven, Belgium (2008)

    Google Scholar 

  7. Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268–289. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Brickell, E., Chen, L., Li, J.: A New Direct Anonymous Attestation Scheme from Bilinear Maps. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 166–178. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. The Legion of BouncyCastle: Bouncy Castle Crypto APIs for Java - Lightweightcrypto j2me 1.43, http://www.bouncycastle.org/java.html

  10. Stiftung SIC: The IAIK JCE MicroEdition Crypto Library - J2ME SDK v3.04, http://jce.iaik.tugraz.at/sic/products/core_crypto_toolkits/jce_me/version

  11. Koc, Ç.K., Acar, T.: Analyzing and Comparing Montgomery Multiplication Algorithms. IEEE Micro 16, 26–33 (1996)

    Article  Google Scholar 

  12. Menezes, A.J., Van Oorschot, P.C.S.: Handbook of applied cryptography. CRC Press series on discrete mathematics and its applications. CRC Press, Boca Raton (1997c); Includes bibliographical references (p. 703-754) and index

    MATH  Google Scholar 

  13. Koc, Ç.K.: Analysis of Sliding Window Techniques for Exponentiation. Computers and Mathematics with Applications 30, 17–24 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  14. IEEE: Ieee standard specifications for public-key cryptography (2000)

    Google Scholar 

  15. National Institute of Standards and Technology - NIST: Digital Signature Standard (DSS) FIPS-186-3. Technical report, National Institute of Standards and Technology, NIST (2009)

    Google Scholar 

  16. ARM Ltd.: Jazelle Architecture Extensions, http://www.arm.com/products/multimedia/java/jazelle_architecture.html

  17. Porthouse, C.: High performance Java on embedded devices. Technical report, ARM Ltd. (2005)

    Google Scholar 

  18. Trusted Computing Group - Mobile Phone Working Group: TCG Mobile Trusted Module Sepecification Version 1 rev. 1.0 (2007), Specification https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf

  19. Trusted Computing Group - Mobile Phone Working Group: TCG Mobile Reference Architecture (June 12, 2007), Specification https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-reference-architecture-1.0.pdf (Specification version 1.0 Revision 1)

  20. Alves, T., Felton, D.: TrustZone: Integrated Hardware and Software Security - Enabling Trusted Computing in Embedded Systems (2004), http://www.arm.com/pdfs/TZ_Whitepaper.pdf

  21. Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29–44. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  22. Krall, A.: Efficient JavaVM Just-in-Time Compilation. In: International Conference on Parallel Architectures and Compilation Techniques, pp. 205–212 (1998)

    Google Scholar 

  23. Lindholm Tim, Y.F.: The Java Virtual Machine Specification Second Edition, http://java.sun.com/docs/books/jvms/second_edition/html/VMSpecTOC.doc.html

  24. Dietrich, K.: An Integrated Architecture for Trusted Computing for Java Enabled Embedded Devices. In: STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 2–6. ACM, New York (2007)

    Chapter  Google Scholar 

  25. Grosschadl, J., Tillich, S., Szekely, A.: Performance Evaluation of Instruction Set Extensions for Long Integer Modular Arithmetic on a SPARC V8 Processor. In: Euromicro Symposium on Digital Systems Design, pp. 680–689 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dietrich, K. (2010). Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation. In: Chen, L., Yung, M. (eds) Trusted Systems. INTRUST 2009. Lecture Notes in Computer Science, vol 6163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14597-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14597-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14596-4

  • Online ISBN: 978-3-642-14597-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics