A Fast Window-based Scalar Multiplication Algorithm for Elliptic Curve Cryptography in Wireless Sensor Networks

被引:0
|
作者
Ye, Hung-Nan [1 ]
Wang, Kuochen [1 ]
Jan, Rong-Hong [1 ]
Hu, Yuh-Jyh [1 ]
Tseng, Yu-Chee [1 ]
Hsu, Yi-Huai [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
关键词
Elliptic curve cryptography; mutual opposite form; one's complement; scalar multiplication; window method;
D O I
10.3233/978-1-61499-484-8-1646
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose an enhanced window-based mutual opposite form (EW-MOF) for scalar multiplication with ECC in WSNs. The proposed EW-MOF combines MOF with an enhanced window method that can reduce not only pre-computation time and memory usage, but also average key generation time that includes pre-computation time in each sensor node. Our analysis has shown that the proposed EW-MOF requires a smaller number of essential pre-computed points than the one's complement. Therefore, it is very suitable for WSNs. Simulation results show that the proposed EW-MOF is 24.69% faster than the one's complement method, which is the best method available, in the average key generation time of ECC that includes pre-computation time under different field sizes. In summary, the proposed EW-MOF is more feasible than the one's complement for wireless sensor networks in terms of key generation time and power saving.
引用
收藏
页码:1646 / 1655
页数:10
相关论文
共 50 条
  • [1] Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication
    Huang, Xu
    Sharma, Dharmendra
    [J]. 2010 16TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2010), 2010, : 458 - 463
  • [2] Dynamic Window with Fuzzy Controller in Wireless Sensor Networks for Elliptic Curve Cryptography
    Huang, Xu
    Sharma, Dharmendra
    Shah, Pritam Gajkumar
    [J]. IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ 2011), 2011, : 2342 - 2349
  • [3] Fast Implementation for Modular Inversion and Scalar Multiplication in the Elliptic Curve Cryptography
    Ma, Shiwei
    Hao, Yuanling
    Pan, Zhongqiao
    Chen, Hui
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 488 - 492
  • [4] Overview of Scalar Multiplication in Elliptic Curve Cryptography
    Li, Ye
    Feng, Liu
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2670 - 2673
  • [5] Accelerated precomputation points-based scalar reduction on elliptic curve cryptography for wireless sensor networks
    Faye, Youssou
    Guyennet, Herve
    Yanbo, Shou
    Niang, Ibrahima
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [6] Optimized Elliptic Curve Cryptography for Wireless Sensor Networks
    Bala, Suman
    Sharma, Gaurav
    Verma, Anil K.
    [J]. 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 89 - 94
  • [7] Security approaches based on elliptic curve cryptography in wireless sensor networks
    Salah, Mohammed Said
    Maizate, Abderrahim
    Ouzzif, Mohammed
    [J]. 2015 27TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2015, : 35 - 38
  • [8] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Qazi, Rosheen
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Islam, Najam Ul
    Iqbal, Saleem
    Arshad, Arsalan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 547 - 566
  • [9] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Rosheen Qazi
    Kashif Naseer Qureshi
    Faisal Bashir
    Najam Ul Islam
    Saleem Iqbal
    Arsalan Arshad
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 547 - 566
  • [10] Optimization algorithm for scalar multiplication in the elliptic curve cryptography over prime field
    Hao, Yuanling
    Ma, Shiwei
    Chen, Guanghua
    Zhang, Xiaoli
    Chen, Hui
    Zeng, Weimin
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF THEORETICAL AND METHODOLOGICAL ISSUES, 2008, 5226 : 904 - +