Table 1: Comparison results in milliseconds for 1392 bit
version of the HM12 scheme and equivalent variant 160 bit
and 224 bit versions of the proposed ecHM12 scheme.
HM12 ecHM12 ecHM12
1392 bit 160 bit 224 bit
Operation tpo n. tt n. tt n. tt
mExp(160) 46 3 138 0 - 0 -
mExp(400) 72 2 150 0 - 0 -
mExp(560) 94 1 94 0 - 0 -
mExp(720) 112 2 224 0 - 0 -
mExp(880) 131 2 262 0 - 0 -
mMul 100 9 900 6 600 6 600
Sub 50 3 150 3 150 3 150
RNG 49 5 245 5 245 5 245
ecMul 52/48 0 - 10 480 10 520
ecAdd 25/23 0 - 2 46 2 50
Total - - 2163 - 1521 - 1565
Note: tpo - time per operation, n. - number of operations, tt - total time per
operation.
ish mid-range server, namely the 2009 IBM x3550
M2 with two Intel Xeon 2.27 GHz processors with
8 cores each and 32 GB RAM, to represent RA. The
EC scalar multiplication over E(F
224
) took negligible
0.0189 ms, i.e. with 100,000 users in the system, the
revocation time will be 1.9 s at maximum.
6 CONCLUSIONS
We presented a new ABC scheme based on ECs and
HM12 scheme. This variant meets all standard re-
quirements on ABC schemes, i.e. anonymity, un-
traceability, unlinkability, selective disclosure of at-
tributes, non-transferability, revocation and malicious
user identification. By involving elliptic curves, the
ecHM12 is faster in the Prove att protocol, which
makes the scheme more applicable in current access
control systems. Prove att protocol (on card) is
about 30% faster than in the HM12 scheme. The effi-
ciency advantage of our scheme grows with a higher
security level of schemes. Our solution has also good
impact on bandwidth, in fact, lower amount of data
is transferred. Data communication is 85% smaller
compared to HM12 protocol and considering compa-
rable security level (1392 bit / 160 bit).
The revocation process requires linear time in the
number of Us instead of constant time of the HM12
scheme, but, considering that the current servers have
high computing power, the slow-down does not really
affect the protocol usability. Our next steps are the
MultOS smart card optimisation and black list check
optimization on V’s side. Further, we would like to
improve the complexity of the Revoke protocol.
ACKNOWLEDGEMENTS
Research was sponsored by the Technology Agency
of the Czech Republic project TA04010476 ”Secure
Systems for Electronic Services User Verification”,
the National Sustainability Program LO1401, Euro-
pean Commission (project H2020 644024 CLARUS)
and Spanish Government (Sec-MCloud TIN2016-
80250-R). For the research, infrastructure of the SIX
Center was used.
REFERENCES
Barker, E. (2016). Recommendation for key management
part 1: General (revision 4). NIST Special Publication
Part 1, 800(57):1–147.
Batina, L., Hoepman, J.-H., Jacobs, B., Mostowski, W.,
and Vullers, P. (2010). Developing efficient blinded
attribute certificates on smart cards via pairings. In
CARDIS, pages 209–222. Springer.
Bichsel, P., Binding, C., Camenisch, J., Groß, T., Heydt-
Benjamin, T., Sommer, D., and Zaverucha, G. (2010).
Specification of the identity mixer cryptographic li-
brary version 2.3.0*. Technical report, IBM.
Camenisch, J. and Stadler, M. (1997). Efficient group
signature schemes for large groups. Advances in
Cryptology—CRYPTO’97, pages 410–424.
Christian Paquin, G. Z. (2013). U-prove cryptographic
specification v1.1. In Microsoft, pages 1–23.
Hajny, J., Dzurenda, P., and Malina, L. (2014). Privacy-
pac: Privacy-enhanced physical access control. In
Proceedings of the ACM CCS, WPES ’14, pages 93–
96, New York, NY, USA. ACM.
Hajny, J. and Malina, L. (2013). Unlinkable attribute-
based credentials with practical revocation on smart-
cards. In Smart Card Research and Advanced Ap-
plications: 11th International Conference, CARDIS
2012, Graz, Austria, November 28-30, 2012, Revised
Selected Papers, pages 62–76, Berlin, Heidelberg.
Springer Berlin Heidelberg.
Mostowski, W. and Vullers, P. (2011). Efficient u-prove
implementation for anonymous credentials on smart
cards. In International Conference on Security and
Privacy in Communication Systems, pages 243–260.
Springer.
Okamoto, T. and Uchiyama, S. (1998). A new public-key
cryptosystem as secure as factoring. In International
Conference on the Theory and Applications of Cryp-
tographic Techniques, pages 308–318. Springer.
Verheul, E. R. (2001). Self-blindable credential certificates
from the weil pairing. pages 533–551.
Anonymous Credentials with Practical Revocation using Elliptic Curves
539