Pairing-Based Cryptography on the Internet of Things: A Feasibility Study

被引:3
|
作者
Karantaidou, Ioanna [1 ]
Halkidis, Spyros T. [1 ]
Petridou, Sophia [1 ]
Mamatas, Lefteris [1 ]
Stephanides, George [1 ]
机构
[1] Univ Macedonia, Dept Appl Informat, Thessaloniki, Greece
关键词
Pairing-based cryptography; Identity-based encryption; Short signatures; Internet of things; IDENTITY-BASED ENCRYPTION; PRIVACY;
D O I
10.1007/978-3-030-02931-9_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pairing-based cryptography (PBC) has recently received much attention, since the mathematical building block of pairings paved the ground for devising efficient cryptographic protocols exploiting an old inspiration, i.e., to produce the public key of an entity based on its identity. The so-called Identity-Based Cryptography (IBC) simplifies key management procedures, since it does not require certificate-based infrastructures. Moreover, it is an elliptic curve cryptosystem which entails that it offers the same security levels as other public key systems with much smaller key lengths. The above characteristics make it an attractive solution for resource-constrained environments such as the Internet of Things (IoT), where strong confidentiality and signature schemes are necessary. In this article, we conducted feasibility tests of pairing-based cryptography for middle-class IoT devices, such as the Raspberry Pi 3 platform.
引用
收藏
页码:219 / 230
页数:12
相关论文
共 50 条
  • [31] Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography
    Sakemi, Yumi
    Nogami, Yasuyuki
    Okeya, Katsuyuki
    Kato, Hidehiro
    Morikawa, Yoshitaka
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 226 - +
  • [32] An efficient implementation of pairing-based cryptography on MSP430 processor
    Jihoon Kwon
    Seog Chung Seo
    Seokhie Hong
    The Journal of Supercomputing, 2018, 74 : 1394 - 1417
  • [33] Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography
    Benger, Naomi
    Scott, Michael
    ARITHMETIC OF FINITE FIELDS, PROCEEDINGS, 2010, 6087 : 180 - 195
  • [34] Improving side-channel attacks against pairing-based cryptography
    Jauvart, Damien
    El Mrabet, Nadia
    Fournier, Jacques J. A.
    Goubin, Louis
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 1 - 16
  • [35] Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
    El Mrabet, Nadia
    Fouotsa, Emmanuel
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 259 - 273
  • [36] Establishing Authenticated Pairwise Key using Pairing-based Cryptography for Sensor Networks
    Yang, Lijun
    Ding, Chao
    Wu, Meng
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 517 - 522
  • [37] Opcount: A Pseudo-Code Performance Estimation System for Pairing-Based Cryptography
    Abe, Masayuki
    Hoshino, Fumitaka
    Ohkubo, Miyako
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (09) : 1285 - 1292
  • [38] Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT
    Perazzo, Pericle
    Vallati, Carlo
    INTERNET OF THINGS, 2025, 30
  • [39] Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor
    Jihoon Kwon
    Seog Chung Seo
    Seokhie Hong
    The Journal of Supercomputing, 2018, 74 : 2254 - 2254
  • [40] Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three
    Granger, R
    Page, D
    Stam, M
    IEEE TRANSACTIONS ON COMPUTERS, 2005, 54 (07) : 852 - 860