Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT

被引:0
|
作者
Perazzo, Pericle [1 ]
Vallati, Carlo [1 ]
机构
[1] Univ Pisa, Dept Informat Engn, Largo Lucio Lazzarino 1, I-56122 Pisa, Italy
关键词
Pairing-based cryptography; Internet of things; Short signature; Identity-based encryption; Attribute-based encryption; Zolertia RE-mote; ATTRIBUTE-BASED ENCRYPTION; PERFORMANCE EVALUATION;
D O I
10.1016/j.iot.2025.101489
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pairing-Based Cryptography (PBC) is a sub-field of elliptic curve cryptography that has been used to design ingenious security protocols including Short Signatures (SS), Identity-Based Encryption (IBE), and Attribute-Based Encryption (ABE). These protocols have extremely promising applications in diverse scenarios, including Internet of Things (IoT), which usually involves computing devices with limited processing, memory, and energy capabilities. Many studies the literature evaluated the performance of PBC on typical IoT devices, giving promising results, and showing that a large class of constrained devices can run PBC schemes. However, in the last years, new advancements in Number Field Sieve algorithms threatened the security of PBC, that all protocols must be re-parametrized with larger keys to maintain the same security level as before. Therefore, past literature reporting PBC performance on IoT devices must be redone because optimistic, and it is not clear whether present IoT devices will bear PBC. In this paper we evaluate the performance of some prominent PBC schemes on a very constrained device, namely the Zolertia RE-Mote platform, which is equipped with an ARM Cortex-M3 processor. From our experiments, the usage of IBE and SS schemes is still possible on IoT devices, but the security level is limited to 80 or 100 bits. Reaching greater security levels leads to higher execution times, which might not be compatible with many IoT applications. The usage ABE is efficient only with IoT-oriented schemes, which offer good performance at the cost of limited policy expressiveness.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Pairing-based cryptography for homomorphic cryptography
    Nogami, Yasuyuki
    Miyoshi, Shunsuke
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 318 - 321
  • [2] Report on Pairing-based Cryptography
    Moody, Dustin
    Peralta, Rene
    Perlner, Ray
    Regenscheid, Andrew
    Roginsky, Allen
    Chen, Lily
    JOURNAL OF RESEARCH OF THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, 2015, 120 : 11 - 27
  • [3] An Introduction to Pairing-Based Cryptography
    Menezes, Alfred
    RECENT TRENDS IN CRYPTOGRAPHY, 2009, 477 : 47 - 65
  • [4] Usability of Pairing-Based Cryptography on Smartphones
    Malina, Lukas
    Hajny, Jan
    Zeman, Vaclav
    2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 617 - 621
  • [5] Subgroup Security in Pairing-Based Cryptography
    Barreto, Paulo S. L. M.
    Costello, Craig
    Misoczki, Rafael
    Naehrig, Michael
    Pereira, Geovandro C. C. F.
    Zanon, Gustavo
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 245 - 265
  • [6] Tampering attacks in pairing-based cryptography
    Bloemer, Johannes
    Guenther, Peter
    Liske, Gennadij
    2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 1 - 7
  • [7] Arithmetic operators for pairing-based cryptography
    Beuchat, Jean-Luc
    Brisebarre, Nicolas
    Detrey, Jeremie
    Okamoto, Eiji
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 239 - +
  • [8] A fault attack on pairing-based cryptography
    Page, Daniel
    Vercauteren, Frederik
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (09) : 1075 - 1080
  • [9] Automated Proofs of Pairing-Based Cryptography
    Barthe, Gilles
    Gregoire, Benjamin
    Schmidt, Benedikt
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1156 - 1168
  • [10] Pairing-Based Cryptography on Elliptic Curves
    Miret, Josep M.
    Sadornil, Daniel
    Tena, Juan G.
    MATHEMATICS IN COMPUTER SCIENCE, 2018, 12 (03) : 309 - 318