Skip to main content

Some Security Topics with Possible Applications for Pairing-Based Cryptography

  • Conference paper
Pairing-Based Cryptography - Pairing 2010 (Pairing 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6487))

Included in the following conference series:

  • 983 Accesses

Abstract

Over the last decade, pairing-based cryptography has found a wide range of interesting applications, both in cryptography and in computer/network security. It often yields the most elegant (if not always the most efficient) techniques. This talk overviews several topics to which pairing-based methods either have not been applied, or where they have not reached their potential. The first topic is “privacy-preserving set operations”, such as private set intersection (PSI) protocols. Despite lots of prior work, state-of-the-art (in terms of efficiency) PSI is grounded in more mundane non-pairing-based number theoretic settings. This is puzzling, since the same does not hold with closely related secret handshakes and affiliation-hiding key exchange (AH-AKE) techniques. The second topic is more applied: “security in unattended wireless sensor networks” (UWSNs). We discuss certain unique security issues occurring in UWSNs, overview some protection measures, and consider whether pairing-based cryptography has some applications in this context. The third topic is “privacy in mobile ad hoc networks” (MANETs). The central goal is to achieve privacy-preserving (i.e., tracking-resistant) mobility in the presence of malicious insiders, while maintaining security. Since security is based on authentication, which is, in turn, usually based on identities, routing and packet forwarding are very challenging. Pairing-based cryptography might offer some useful techniques for reconciling security and privacy in this context. Finally, we consider the topic of “secure code attestation for embedded devices” where the main challenge is: how an untrusted (and possibly compromised) device can convince a trusted verifier that it runs appropriate code. After discussing current approaches, once again, consider whether pairing techniques can be of use.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tsudik, G. (2010). Some Security Topics with Possible Applications for Pairing-Based Cryptography. In: Joye, M., Miyaji, A., Otsuka, A. (eds) Pairing-Based Cryptography - Pairing 2010. Pairing 2010. Lecture Notes in Computer Science, vol 6487. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17455-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17455-1_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17454-4

  • Online ISBN: 978-3-642-17455-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics