skip to main content
10.1145/3203217.3206426acmconferencesArticle/Chapter ViewAbstractPublication PagescfConference Proceedingsconference-collections
research-article

Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage

Published: 08 May 2018 Publication History

Abstract

This paper targets the efficient implementation of digital signatures and signcryption schemes on typical internet-of-things (IoT) devices, i.e. embedded processors with constrained computation power and storage. Both signcryption schemes (providing digital signatures and encryption simultaneously) and digital signatures rely on computation-intensive public-key cryptography. When the number of signatures or encrypted messages the device needs to generate after deployment is limited, a trade-off can be made between performing the entire computation on the embedded device or moving part of the computation to a precomputation phase. The latter results in the storage of the precomputed values in the memory of the processor. We examine this trade-off on a health sensor platform and we additionally apply storage encryption, resulting in five implementation variants of the considered schemes.

References

[1]
Recommended Elliptic Curves for Federal Government Use, National Institute of Standards and Technology, 1999.
[2]
SEC 2: Recommended Elliptic Curve Domain Parameters, Certicom Research, Standards for Efficient Cryptography Version 1.0, 2000.
[3]
Braeken, A., Shabisha, P., Touhafi, A., and Steenhaut, K. Pairing free and implicit certificate based signcryption scheme with proxy re-encryption for secure cloud data storage. In 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech) (2017), IEEE, pp. 1--7.
[4]
Koblitz, N. Elliptic curve cryptosystems. Mathematics of computation 48, 177 (1987), 203--209.
[5]
Lee, P., Lee, E., and Kim, Y. How to Implement Cost-Effective and Secure Public Key Cryptosystems. Ches (1999), 73--79.
[6]
Miller, V. S. Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (1985), Springer, pp. 417--426.
[7]
NIST. Recommendation for Block Cipher Modes of Operation: Galois Counter Mode (GCM) and GMAC (SP800-38D), 2007.
[8]
Saied, Y. B., and Olivereau, A. D-hip: A distributed key exchange scheme for hip-based internet of things. In 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2012), pp. 1--7.
[9]
Saied, Y. B., Olivereau, A., Zeghlache, D., and Laurent, M. Lightweight collaborative key establishment scheme for the internet of things. Computer Networks 64 (2014), 273--295.
[10]
Schnorr, C. P. Efficient signature generation by smart cards. Journal of Cryptology 4, 3 (1991), 161--174.

Cited By

View all
  • (2018)Storage and computation optimization of public-key schemes on embedded devices2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech)10.1109/CloudTech.2018.8713334(1-8)Online publication date: Nov-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CF '18: Proceedings of the 15th ACM International Conference on Computing Frontiers
May 2018
401 pages
ISBN:9781450357616
DOI:10.1145/3203217
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 May 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. digital signature
  2. health sensor platform
  3. internet of things
  4. precomputation
  5. public-key cryptography
  6. schnorr
  7. signcryption
  8. storage encryption

Qualifiers

  • Research-article

Conference

CF '18
Sponsor:
CF '18: Computing Frontiers Conference
May 8 - 10, 2018
Ischia, Italy

Acceptance Rates

Overall Acceptance Rate 273 of 785 submissions, 35%

Upcoming Conference

CF '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)2
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Storage and computation optimization of public-key schemes on embedded devices2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech)10.1109/CloudTech.2018.8713334(1-8)Online publication date: Nov-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media