2010
DOI: 10.1007/978-3-642-12510-2_15
|View full text |Cite
|
Sign up to set email alerts
|

Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings

Abstract: Abstract. This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified on the reader-side via a bilinear pairing.Java Card smart cards offer only very limited access to the cryptographic coprocessor. It thus requires some ingenuity to get the protocol running with reasonable… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
1

Year Published

2012
2012
2016
2016

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 21 publications
0
20
1
Order By: Relevance
“…The chip therefore, reduces the number of cards, making one card the access key to many accounts. The smart card as a payment instrument has processing power that allows the smart card payment system to be used for multiple functions and/or applications [3]. This of course, reduces the overall number of cards in the consumer's wallet, though there are many arguments and issues about whether or not smart card is secured and safe enough to store such information.…”
Section: Smart Card Payment Systemmentioning
confidence: 99%
“…The chip therefore, reduces the number of cards, making one card the access key to many accounts. The smart card as a payment instrument has processing power that allows the smart card payment system to be used for multiple functions and/or applications [3]. This of course, reduces the overall number of cards in the consumer's wallet, though there are many arguments and issues about whether or not smart card is secured and safe enough to store such information.…”
Section: Smart Card Payment Systemmentioning
confidence: 99%
“…They consider a hybrid system with two kinds of tickets: passive RFID transponders and embedded systems such as cell phones. E-cash Implementations Implementations of anonymous credentials on Java cards have been presented in [8] and [6]. Hinterwälder et al presented an implementation of Brands' e-cash scheme for a computational RFID tag [24].…”
Section: Related Workmentioning
confidence: 99%
“…The underlying prime field of this curve Z p is based on a generalized Mersenne prime p = 2 160 −2 31 −1, which allows for an efficient implementation of the curve arithmetic. On the terminal side we use the Bouncy Castle Crypto Library version 1.5 6 . This library provides a general elliptic curve framework supporting the use of many different curves.…”
Section: Cryptographic Frameworkmentioning
confidence: 99%
“…The benefit of this approach is that the use of such credentials is untraceable. Furthermore they can be efficiently implemented on a smart card [2,17] using elliptic curve cryptography (ECC), providing the best performance results thus far.…”
Section: Self-blindable Credentialsmentioning
confidence: 99%
“…One way to achieve this is to use attributes instead of identities. A number of technologies [2,6,9] have been developed based on this idea, but the main focus has been on the cryptography and less on (efficient) implementations. The implementations which have been made are mainly for ordinary computers.…”
Section: Introductionmentioning
confidence: 99%