Pairing-Based Cryptography on the Internet of Things: A Feasibility Study

被引:3
|
作者
Karantaidou, Ioanna [1 ]
Halkidis, Spyros T. [1 ]
Petridou, Sophia [1 ]
Mamatas, Lefteris [1 ]
Stephanides, George [1 ]
机构
[1] Univ Macedonia, Dept Appl Informat, Thessaloniki, Greece
关键词
Pairing-based cryptography; Identity-based encryption; Short signatures; Internet of things; IDENTITY-BASED ENCRYPTION; PRIVACY;
D O I
10.1007/978-3-030-02931-9_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pairing-based cryptography (PBC) has recently received much attention, since the mathematical building block of pairings paved the ground for devising efficient cryptographic protocols exploiting an old inspiration, i.e., to produce the public key of an entity based on its identity. The so-called Identity-Based Cryptography (IBC) simplifies key management procedures, since it does not require certificate-based infrastructures. Moreover, it is an elliptic curve cryptosystem which entails that it offers the same security levels as other public key systems with much smaller key lengths. The above characteristics make it an attractive solution for resource-constrained environments such as the Internet of Things (IoT), where strong confidentiality and signature schemes are necessary. In this article, we conducted feasibility tests of pairing-based cryptography for middle-class IoT devices, such as the Raspberry Pi 3 platform.
引用
收藏
页码:219 / 230
页数:12
相关论文
共 50 条
  • [1] Pairing-based cryptography for homomorphic cryptography
    Nogami, Yasuyuki
    Miyoshi, Shunsuke
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 318 - 321
  • [2] Report on Pairing-based Cryptography
    Moody, Dustin
    Peralta, Rene
    Perlner, Ray
    Regenscheid, Andrew
    Roginsky, Allen
    Chen, Lily
    JOURNAL OF RESEARCH OF THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, 2015, 120 : 11 - 27
  • [3] An Introduction to Pairing-Based Cryptography
    Menezes, Alfred
    RECENT TRENDS IN CRYPTOGRAPHY, 2009, 477 : 47 - 65
  • [4] Usability of Pairing-Based Cryptography on Smartphones
    Malina, Lukas
    Hajny, Jan
    Zeman, Vaclav
    2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 617 - 621
  • [5] Subgroup Security in Pairing-Based Cryptography
    Barreto, Paulo S. L. M.
    Costello, Craig
    Misoczki, Rafael
    Naehrig, Michael
    Pereira, Geovandro C. C. F.
    Zanon, Gustavo
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 245 - 265
  • [6] Tampering attacks in pairing-based cryptography
    Bloemer, Johannes
    Guenther, Peter
    Liske, Gennadij
    2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 1 - 7
  • [7] Arithmetic operators for pairing-based cryptography
    Beuchat, Jean-Luc
    Brisebarre, Nicolas
    Detrey, Jeremie
    Okamoto, Eiji
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 239 - +
  • [8] A fault attack on pairing-based cryptography
    Page, Daniel
    Vercauteren, Frederik
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (09) : 1075 - 1080
  • [9] Automated Proofs of Pairing-Based Cryptography
    Barthe, Gilles
    Gregoire, Benjamin
    Schmidt, Benedikt
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1156 - 1168
  • [10] Pairing-Based Cryptography on Elliptic Curves
    Miret, Josep M.
    Sadornil, Daniel
    Tena, Juan G.
    MATHEMATICS IN COMPUTER SCIENCE, 2018, 12 (03) : 309 - 318