Group-Signature Schemes on Constrained Devices: The Gap Between Theory and Practice

Raphael Spreitzer, Jörn-Marc Schmidt

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Group-signature schemes allow members within a predefined group to prove specific properties without revealing more information than necessary. Potential areas of application include electronic IDs (eIDs) and smartcards, i.e., resource-constrained environments. Though literature provides many theoretical proposals for group-signature schemes, practical evaluations regarding the applicability of such mechanisms in resource-constrained environments are missing. In this work, we investigate four different group-signature schemes in terms of mathematical operations, signature length, and the proposed revocation mechanisms. We also use the RELIC toolkit to implement the two most promising of the investigated group-signature schemes---one of which is going to be standardized in ISO/IEC 20008---for the AVR microcontroller. This allows us to give practical insights into the applicability of pairings on the AVR microcontroller in general and the applicability of group-signature schemes in particular on the very same. Contrary to the general recommendation of precomputing and storing pairing evaluations if possible, we observed that the evaluation of pairings might be faster than computations on cached pairings.
Original languageEnglish
Title of host publicationCS2'14 Proceedings
PublisherAssociation of Computing Machinery
Pages31-36
ISBN (Print)978-1-4503-2484-7
DOIs
Publication statusPublished - 2014
EventWorkshop on Cryptography and Security in Computing Systems - Wien, Austria
Duration: 20 Jan 201422 Jan 2014

Conference

ConferenceWorkshop on Cryptography and Security in Computing Systems
CountryAustria
CityWien
Period20/01/1422/01/14

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application

Fingerprint Dive into the research topics of 'Group-Signature Schemes on Constrained Devices: The Gap Between Theory and Practice'. Together they form a unique fingerprint.

  • Projects

    NewP@ass - New verification & valdidation methods enabling widespread use of Privacy and @nonymity in electronically secured systems

    Röck, F., Unterluggauer, T., Könighofer, R., Mangard, S., Wenger, E., Spreitzer, R. C., Mendel, F., Schmidt, J. & Bloem, R.

    1/05/1231/05/15

    Project: Research project

    RFID Security

    Wenger, E., Hutter, M., Oswald, M. E., Posch, K., Plos, T., Herbst, C., Schmidt, J., Feldhofer, M., Szekely, A., Dominikus, S., Aigner, M. J., Kirschbaum, M., Medwed, M. & Posch, R.

    1/01/0515/07/19

    Project: Research area

    Cite this

    Spreitzer, R., & Schmidt, J-M. (2014). Group-Signature Schemes on Constrained Devices: The Gap Between Theory and Practice. In CS2'14 Proceedings (pp. 31-36). Association of Computing Machinery. https://doi.org/10.1145/2556315.2556321