2009
DOI: 10.1587/transinf.e92.d.909
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Implementation of Pairing-Based Cryptography on a Sensor Node

Abstract: SUMMARYPairing-based cryptography provides us many novel cryptographic applications such as ID-based cryptosystems and efficient broadcast encryptions. The security problems in ubiquitous sensor networks have been discussed in many papers, and pairing-based cryptography is a crucial technique to solve them. Due to the limited resources in the current sensor node, it is challenged to optimize the implementation of pairings on sensor nodes. In this paper we present an efficient implementation of pairing over MIC… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 20 publications
0
15
0
1
Order By: Relevance
“…This method executes consecutive bitwise exclusive‐or on intermediate results under condition of bit setting by block‐wise . Over AVR processor, 6 bytes are recommended as a suitable block size by considering the number of 8‐bit general purpose registers (32 registers in AVR).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This method executes consecutive bitwise exclusive‐or on intermediate results under condition of bit setting by block‐wise . Over AVR processor, 6 bytes are recommended as a suitable block size by considering the number of 8‐bit general purpose registers (32 registers in AVR).…”
Section: Related Workmentioning
confidence: 99%
“…Nonetheless, advanced binary field implementations can achieve remarkably good performance by reducing the number of partial products and replacing bit operations for binary multiplication to look‐up table access known as Lopez et al 's method . The alternative approach, Block‐Comb‐based multiplication is introduced in in which several operands are grouped in block‐wise and multiplication is computed in group‐wise fashion. Recently, an unbalanced fashion of Block‐Comb method is presented by Seo et al in .…”
Section: Introductionmentioning
confidence: 99%
“…This method executes multiplication with a partial product of the block size [12]. In Figure 5, gray blocks represent the multiplication size, and A[0-1] and B[0-1] are the sources for the first partial block product, based on which each bit will be tested and the result registers updated.…”
Section: Block Combmentioning
confidence: 99%
“…After that, identity-based cryptography was an open problem for seventeen years, until Boneh and Franklin could represent the first Provably-Secure identity-based encryption scheme in random-oracle model and under BDH (Certification Authority) assumption [22]. [5], [6] Making pairing operations more efficient in the term of speed of running.…”
Section: Seyed-mohsen Ghoreishi and Ismail Fauzi Isninmentioning
confidence: 99%