Abstract
Anonymity and privacy protection are very important issues for Trusted Computing enabled platforms. These topics are especially important when two platforms perform a remote attestation as specified by the Trusted Computing Group (TCG). Attestation requires a platform to prove its current platform configuration by cryptographic means. However, using common digital signature schemes requires a complex public key infrastructure and allows the verifier to track and identify the signing platform. In order to address this problem, the TCG has introduced two concepts how the anonymity of Trusted Platform Modules (TPMs), and with it the anonymity of certain platforms, can be protected. The most promising of these two concepts is the Direct Anonymous Attestation (DAA) scheme which eliminates the requirement of a remote authority but includes complex mathematical computations. In this paper, we address the question whether anonymous credential systems like DAA can be efficiently used on Java enabled platforms and resource constrained devices like mobile phones. In order to be able to investigate this situation, we developed a software library that supports the basic DAA processes setup, join, sign and verify for J2SE and J2ME based virtual machines. Although our results show that DAA can efficiently be used on desktop platforms, off-the-shelf mobile phones require some premises in order to use DAA adequately.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Trusted Computing Group - TPM Working Group: TPM Main Part 3 Commands (July 9, 2007), Specification https://www.trustedcomputinggroup.org/specs/TPM/mainP3Commandsrev103.zip (Specification version 1.2 Level 2 Revision 103)
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132–145. ACM, New York (2004)
SUN Community process - JSR 139: J2ME(TM) Connected Limited Device Configuration (CLDC) Specification 1.1 Final Release (March 4, 2004), Specification http://jcp.org/aboutJava/communityprocess/final/jsr139/index.html
Mitchell, C.: Direct Anonymous Attestation in Context. In: Trusted Computing, Professional Applications of Computing, Piscataway, NJ, USA, pp. 143–174. IEEE Press, Los Alamitos (2005)
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard Java Card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS 2009). ACM Press, New York (2009) (to appear)
Balasch Masoliver, J.M.: Smart Card Implementation of Anonymous Credentials. Master’s thesis, K.U.Leuven, Belgium (2008)
Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268–289. Springer, Heidelberg (2003)
Brickell, E., Chen, L., Li, J.: A New Direct Anonymous Attestation Scheme from Bilinear Maps. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 166–178. Springer, Heidelberg (2008)
The Legion of BouncyCastle: Bouncy Castle Crypto APIs for Java - Lightweightcrypto j2me 1.43, http://www.bouncycastle.org/java.html
Stiftung SIC: The IAIK JCE MicroEdition Crypto Library - J2ME SDK v3.04, http://jce.iaik.tugraz.at/sic/products/core_crypto_toolkits/jce_me/version
Koc, Ç.K., Acar, T.: Analyzing and Comparing Montgomery Multiplication Algorithms. IEEE Micro 16, 26–33 (1996)
Menezes, A.J., Van Oorschot, P.C.S.: Handbook of applied cryptography. CRC Press series on discrete mathematics and its applications. CRC Press, Boca Raton (1997c); Includes bibliographical references (p. 703-754) and index
Koc, Ç.K.: Analysis of Sliding Window Techniques for Exponentiation. Computers and Mathematics with Applications 30, 17–24 (1995)
IEEE: Ieee standard specifications for public-key cryptography (2000)
National Institute of Standards and Technology - NIST: Digital Signature Standard (DSS) FIPS-186-3. Technical report, National Institute of Standards and Technology, NIST (2009)
ARM Ltd.: Jazelle Architecture Extensions, http://www.arm.com/products/multimedia/java/jazelle_architecture.html
Porthouse, C.: High performance Java on embedded devices. Technical report, ARM Ltd. (2005)
Trusted Computing Group - Mobile Phone Working Group: TCG Mobile Trusted Module Sepecification Version 1 rev. 1.0 (2007), Specification https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf
Trusted Computing Group - Mobile Phone Working Group: TCG Mobile Reference Architecture (June 12, 2007), Specification https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-reference-architecture-1.0.pdf (Specification version 1.0 Revision 1)
Alves, T., Felton, D.: TrustZone: Integrated Hardware and Software Security - Enabling Trusted Computing in Embedded Systems (2004), http://www.arm.com/pdfs/TZ_Whitepaper.pdf
Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29–44. Springer, Heidelberg (2009)
Krall, A.: Efficient JavaVM Just-in-Time Compilation. In: International Conference on Parallel Architectures and Compilation Techniques, pp. 205–212 (1998)
Lindholm Tim, Y.F.: The Java Virtual Machine Specification Second Edition, http://java.sun.com/docs/books/jvms/second_edition/html/VMSpecTOC.doc.html
Dietrich, K.: An Integrated Architecture for Trusted Computing for Java Enabled Embedded Devices. In: STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 2–6. ACM, New York (2007)
Grosschadl, J., Tillich, S., Szekely, A.: Performance Evaluation of Instruction Set Extensions for Long Integer Modular Arithmetic on a SPARC V8 Processor. In: Euromicro Symposium on Digital Systems Design, pp. 680–689 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dietrich, K. (2010). Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation. In: Chen, L., Yung, M. (eds) Trusted Systems. INTRUST 2009. Lecture Notes in Computer Science, vol 6163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14597-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-14597-1_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14596-4
Online ISBN: 978-3-642-14597-1
eBook Packages: Computer ScienceComputer Science (R0)