Projekte pro Jahr
Abstract
Group signature schemes enable participants to sign on behalf of a group in an anonymous manner. The upcoming ISO20008-2 standard defines seven such schemes, which differ in terms of capabilities, used crypto systems and revocation approaches. Further information about practical considerations, such as runtime performance or implementation overhead is considered useful when deciding for a certain scheme. We present a Java framework that allows for a detailed comparison of the mechanisms, of which three are already implemented. For these implemented mechanisms, a detailed performance evaluation is shown
for both a notebook and Android-based mobile devices. Furthermore, significant experiences during implementing and evaluating the schemes as well as crucial bottlenecks are pointed out. We remain in the flexible Java environment, without special platform-specific optimizations. Using precomputation, we already achieve acceptable online signing timings. Signing times are considered most important given proposed application scenarios.
for both a notebook and Android-based mobile devices. Furthermore, significant experiences during implementing and evaluating the schemes as well as crucial bottlenecks are pointed out. We remain in the flexible Java environment, without special platform-specific optimizations. Using precomputation, we already achieve acceptable online signing timings. Signing times are considered most important given proposed application scenarios.
Originalsprache | englisch |
---|---|
Titel | Trust and trustworthy computing |
Untertitel | 6th international conference, TRUST 2013, London, UK, June 17-19, 2013 ; proceedings |
Erscheinungsort | Berlin; Heidelberg |
Herausgeber (Verlag) | Springer |
Seiten | 47-64 |
ISBN (elektronisch) | 978-3-642-38908-5 |
ISBN (Print) | 978-3-642-38907-8 |
DOIs | |
Publikationsstatus | Veröffentlicht - 2013 |
Veranstaltung | 6th International Conference on Trust & Trustworthy Computing: TRUST 2013 - London, Großbritannien / Vereinigtes Königreich Dauer: 17 Juni 2013 → 19 Juni 2013 |
Publikationsreihe
Name | Lecture Notes in Computer Science |
---|---|
Band | 7904 |
Konferenz
Konferenz | 6th International Conference on Trust & Trustworthy Computing |
---|---|
Kurztitel | TRUST 2013 |
Land/Gebiet | Großbritannien / Vereinigtes Königreich |
Ort | London |
Zeitraum | 17/06/13 → 19/06/13 |
Fields of Expertise
- Information, Communication & Computing
Treatment code (Nähere Zuordnung)
- Experimental
Projekte
- 1 Abgeschlossen
-
EU - SEPIA - Secure, Embedded Platform with advanced Process Isolation and Anonymity Capabilities
Winter, J. (Teilnehmer (Co-Investigator)), Dietrich, K. (Teilnehmer (Co-Investigator)), Pirker, M. (Teilnehmer (Co-Investigator)), Hein, D. (Teilnehmer (Co-Investigator)), Bloem, R. (Teilnehmer (Co-Investigator)), Tögl, R. (Teilnehmer (Co-Investigator)) & Podesser, S. (Teilnehmer (Co-Investigator))
1/06/10 → 31/05/13
Projekt: Forschungsprojekt