skip to main content
10.1145/3288599.3296014acmconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

Optimized CL-PKE with lightweight encryption for resource constrained devices

Published: 04 January 2019 Publication History

Abstract

Resource constrained devices such as sensors and RFIDs are utilized in many application areas to sense, store and transmit the sensitive data. This data must be encrypted to achieve confidentiality. The implementation of traditional public key encryption (PKE) techniques by these devices is always challenging as they possess very limited computational resources. Various encryption schemes based on identity-based encryption (IBE) and certificate-less public key encryption (CL-PKE) have been proposed to overcome limitations of PKI. However, many of these schemes involve the computationally expensive exponentiation and bilinear pairing operations on elliptic curve group to encrypt the messages. In this context, we propose a lightweight optimized CL-PKE scheme in which exponentiation and pairing operations are completely eliminated during encryption and only involves computation of cheaper addition and multiplication operations on elliptic curve. Implementation of the proposed scheme confirms its lightweight nature as compared to original CL-PKE scheme.

References

[1]
Sattam S Al-Riyami and Kenneth G Paterson. 2003. Certificateless public key cryptography. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 452--473.
[2]
Ian Blake, Gadiel Seroussi, and Nigel Smart. 1999. Elliptic curves in cryptography. Vol. 265. Cambridge University Press.
[3]
Dan Boneh and Xavier Boyen. 2004. Efficient selective-ID secure identity-based encryption without random oracles. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 223--238.
[4]
Dan Boneh and Matthew Franklin. 2003. Identity-based encryption from the Weil pairing. SIAM journal on computing 32, 3 (2003), 586--615.
[5]
Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S Wong and Vijay Varadharajan. 2017. Optimized identity-based encryption from bilinear pairing for lightweight devices. IEEE Transactions on Dependable and Secure Computing 14, 2 (2017), 211--220.
[6]
Craig Gentry. 2006. Practical identity-based encryption without random oracles. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 445--464.
[7]
Kerry A McKay, Kerry A McKay, Larry Bassham, Meltem Sonmez Turan, and Nicky Mouha. 2017. Report on lightweight cryptography. US Department of Commerce, National Institute of Standards and Technology.
[8]
Kenneth G Paterson. 2002. ID-based signatures from pairings on elliptic curves. Electronics Letters 38, 18 (2002), 1025--1026.
[9]
Alka Sawlikar. 2012. Point Multiplication Methods for Elliptic curve Cryptography. International Journal of Engineering and Innovative Technology (IJEIT) 1, 1 (2012), 1--4.
[10]
SM RiazulIslam, Daehan Kwak, MD Humaun Kabir, Mahmud Hossain and Kyung-Sup Kwak. 2015. The internet of things for health care: A Comprehensive Survey. IEEE Access 3 (2015), 678--708.
[11]
Serge Vaudenay. 2007. On privacy models for RFID. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 68--87.
[12]
Brent Waters. 2005. Efficient identity-based encryption without random oracles. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 114--127.
[13]
Xuefei Cao, Xingwen Zeng, Weidong Kou and Liangbing Hu. 2009. Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Transactions on Vehicular Technology 58, 7 (2009), 3508--3517.

Cited By

View all
  • (2024)Secure Certificateless Maximum Achievable Throughput in Successive IoT Relay NetworksInformation Technology Security10.1007/978-981-97-0407-1_8(189-208)Online publication date: 2-Apr-2024
  • (2019)Simple and Effective Secure Group Communications in Dynamic Wireless Sensor NetworksSensors10.3390/s1908190919:8(1909)Online publication date: 22-Apr-2019
  • (2019)Certificate-less Public Key Encryption For Secure e-Healthcare Systems2019 IEEE Conference on Information and Communication Technology10.1109/CICT48419.2019.9066190(1-5)Online publication date: Dec-2019

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICDCN '19: Proceedings of the 20th International Conference on Distributed Computing and Networking
January 2019
535 pages
ISBN:9781450360944
DOI:10.1145/3288599
  • General Chairs:
  • R. C. Hansdah,
  • Dilip Krishnaswamy,
  • Nitin Vaidya
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 January 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bilinear pairing
  2. certificate-less public key encryption algorithm
  3. lightweight
  4. resource constrained devices

Qualifiers

  • Research-article

Conference

ICDCN '19
Sponsor:
  • SIGOPS
  • Indian Institute of Science

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)2
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Secure Certificateless Maximum Achievable Throughput in Successive IoT Relay NetworksInformation Technology Security10.1007/978-981-97-0407-1_8(189-208)Online publication date: 2-Apr-2024
  • (2019)Simple and Effective Secure Group Communications in Dynamic Wireless Sensor NetworksSensors10.3390/s1908190919:8(1909)Online publication date: 22-Apr-2019
  • (2019)Certificate-less Public Key Encryption For Secure e-Healthcare Systems2019 IEEE Conference on Information and Communication Technology10.1109/CICT48419.2019.9066190(1-5)Online publication date: Dec-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media