Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT

被引:0
|
作者
Perazzo, Pericle [1 ]
Vallati, Carlo [1 ]
机构
[1] Univ Pisa, Dept Informat Engn, Largo Lucio Lazzarino 1, I-56122 Pisa, Italy
关键词
Pairing-based cryptography; Internet of things; Short signature; Identity-based encryption; Attribute-based encryption; Zolertia RE-mote; ATTRIBUTE-BASED ENCRYPTION; PERFORMANCE EVALUATION;
D O I
10.1016/j.iot.2025.101489
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pairing-Based Cryptography (PBC) is a sub-field of elliptic curve cryptography that has been used to design ingenious security protocols including Short Signatures (SS), Identity-Based Encryption (IBE), and Attribute-Based Encryption (ABE). These protocols have extremely promising applications in diverse scenarios, including Internet of Things (IoT), which usually involves computing devices with limited processing, memory, and energy capabilities. Many studies the literature evaluated the performance of PBC on typical IoT devices, giving promising results, and showing that a large class of constrained devices can run PBC schemes. However, in the last years, new advancements in Number Field Sieve algorithms threatened the security of PBC, that all protocols must be re-parametrized with larger keys to maintain the same security level as before. Therefore, past literature reporting PBC performance on IoT devices must be redone because optimistic, and it is not clear whether present IoT devices will bear PBC. In this paper we evaluate the performance of some prominent PBC schemes on a very constrained device, namely the Zolertia RE-Mote platform, which is equipped with an ARM Cortex-M3 processor. From our experiments, the usage of IBE and SS schemes is still possible on IoT devices, but the security level is limited to 80 or 100 bits. Reaching greater security levels leads to higher execution times, which might not be compatible with many IoT applications. The usage ABE is efficient only with IoT-oriented schemes, which offer good performance at the cost of limited policy expressiveness.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Some Security Topics with Possible Applications for Pairing-Based Cryptography
    Tsudik, Gene
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 40 - 40
  • [22] Applications of Pairing-Based Cryptography on Automotive-Grade Microcontrollers
    Andreica, Tudor
    Groza, Bogdan
    Murvay, Pal-Stefan
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2018, 2018, 11094 : 331 - 343
  • [23] Securing Information Exchange in VANETs by Using Pairing-Based Cryptography
    Chen, Chin-Ling
    Shin, Jungpil
    Tsai, Yu-Ting
    Castiglione, Aniello
    Palmieri, Francesco
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 781 - 797
  • [24] Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices
    Hajny, Jan
    Dzurenda, Petr
    Ricci, Sara
    Malina, Lukas
    Vrba, Kamil
    2018 10TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2018): EMERGING TECHNOLOGIES FOR CONNECTED SOCIETY, 2018,
  • [25] An efficient implementation of pairing-based cryptography on MSP430 processor
    Kwon, Jihoon
    Seo, Seog Chung
    Hong, Seokhie
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (03): : 1394 - 1417
  • [26] Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography
    Menezes, Alfred
    Sarkar, Palash
    Singh, Shashank
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 83 - 108
  • [27] Improving side-channel attacks against pairing-based cryptography
    Damien Jauvart
    Nadia El Mrabet
    Jacques J. A. Fournier
    Louis Goubin
    Journal of Cryptographic Engineering, 2020, 10 : 1 - 16
  • [28] On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based Cryptography
    Zhang, Meng
    Chen, Xuehong
    Xu, Maozhi
    Wang, Jie
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 60 - 70
  • [29] The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
    Jager, Tibor
    Rupp, Andy
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 539 - +
  • [30] Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography
    Sakemi, Yumi
    Nogami, Yasuyuki
    Okeya, Katsuyuki
    Kato, Hidehiro
    Morikawa, Yoshitaka
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 226 - +