Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007) 2007
DOI: 10.1109/nca.2007.48
|View full text |Cite
|
Sign up to set email alerts
|

TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes

Abstract: After a few years of intense research, Wireless Sensor Networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled a wide range of novel cryptosystems. In this work we present TinyTate, the first known implementation of pairings for sensor nodes based on the 8-bit/7.3828-MHz ATmega128L microcontroller (e.g., MICA2 and MICAz motes). We then conclude that cryptography from pairings is indeed viable in resource-constrained nodes.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0
6

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 83 publications
(44 citation statements)
references
References 39 publications
0
38
0
6
Order By: Relevance
“…In the literature we can find some papers (e.g [30,31,32,33,34,35,10]) that envision WSNs as a scenario in which to exploit Pairing-based Cryptography (PBC). Of those related to pairing implementation on sensor nodes, McCusker et al [33] have focused on a hardware solution that both implements primitives for computing the Tate pairing and meets the strict energy constraints of sensor nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the literature we can find some papers (e.g [30,31,32,33,34,35,10]) that envision WSNs as a scenario in which to exploit Pairing-based Cryptography (PBC). Of those related to pairing implementation on sensor nodes, McCusker et al [33] have focused on a hardware solution that both implements primitives for computing the Tate pairing and meets the strict energy constraints of sensor nodes.…”
Section: Related Workmentioning
confidence: 99%
“…This fact has motivated work on how to compute PKC efficiently in sensor nodes (e.g., [7,8,9,10]). The problem is challenging because those tiny devices have very limited battery life and we cannot afford to spend too much processor time on additional computations.…”
Section: Introductionmentioning
confidence: 99%
“…, 255}. The trace t i is recorded while the device encrypts the input data m i with the use of the fixed secret key k ∈ {0, 1} 128 . Each trace consists of N points in time, i.e., N is the length of the traces and thus, t i = (t i,1 , .…”
Section: Cryptanalysismentioning
confidence: 99%
“…Then, we describe the cryptanalytic details for the case that another pairing, the reduced Tate pairing, is attacked with a secondorder attack. We analyze the same implementation of the Tate pairing as used in TinyTate, which is an implementation of the Tate pairing for sensor nodes [128].…”
Section: Cryptanalysismentioning
confidence: 99%
See 1 more Smart Citation