skip to main content
10.1145/3288599.3296014acmconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

Optimized CL-PKE with lightweight encryption for resource constrained devices

Authors Info & Claims
Published:04 January 2019Publication History

ABSTRACT

Resource constrained devices such as sensors and RFIDs are utilized in many application areas to sense, store and transmit the sensitive data. This data must be encrypted to achieve confidentiality. The implementation of traditional public key encryption (PKE) techniques by these devices is always challenging as they possess very limited computational resources. Various encryption schemes based on identity-based encryption (IBE) and certificate-less public key encryption (CL-PKE) have been proposed to overcome limitations of PKI. However, many of these schemes involve the computationally expensive exponentiation and bilinear pairing operations on elliptic curve group to encrypt the messages. In this context, we propose a lightweight optimized CL-PKE scheme in which exponentiation and pairing operations are completely eliminated during encryption and only involves computation of cheaper addition and multiplication operations on elliptic curve. Implementation of the proposed scheme confirms its lightweight nature as compared to original CL-PKE scheme.

References

  1. Sattam S Al-Riyami and Kenneth G Paterson. 2003. Certificateless public key cryptography. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 452--473.Google ScholarGoogle ScholarCross RefCross Ref
  2. Ian Blake, Gadiel Seroussi, and Nigel Smart. 1999. Elliptic curves in cryptography. Vol. 265. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Dan Boneh and Xavier Boyen. 2004. Efficient selective-ID secure identity-based encryption without random oracles. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 223--238.Google ScholarGoogle ScholarCross RefCross Ref
  4. Dan Boneh and Matthew Franklin. 2003. Identity-based encryption from the Weil pairing. SIAM journal on computing 32, 3 (2003), 586--615. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S Wong and Vijay Varadharajan. 2017. Optimized identity-based encryption from bilinear pairing for lightweight devices. IEEE Transactions on Dependable and Secure Computing 14, 2 (2017), 211--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Craig Gentry. 2006. Practical identity-based encryption without random oracles. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 445--464. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kerry A McKay, Kerry A McKay, Larry Bassham, Meltem Sonmez Turan, and Nicky Mouha. 2017. Report on lightweight cryptography. US Department of Commerce, National Institute of Standards and Technology.Google ScholarGoogle Scholar
  8. Kenneth G Paterson. 2002. ID-based signatures from pairings on elliptic curves. Electronics Letters 38, 18 (2002), 1025--1026.Google ScholarGoogle ScholarCross RefCross Ref
  9. Alka Sawlikar. 2012. Point Multiplication Methods for Elliptic curve Cryptography. International Journal of Engineering and Innovative Technology (IJEIT) 1, 1 (2012), 1--4.Google ScholarGoogle Scholar
  10. SM RiazulIslam, Daehan Kwak, MD Humaun Kabir, Mahmud Hossain and Kyung-Sup Kwak. 2015. The internet of things for health care: A Comprehensive Survey. IEEE Access 3 (2015), 678--708.Google ScholarGoogle ScholarCross RefCross Ref
  11. Serge Vaudenay. 2007. On privacy models for RFID. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 68--87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Brent Waters. 2005. Efficient identity-based encryption without random oracles. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 114--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Xuefei Cao, Xingwen Zeng, Weidong Kou and Liangbing Hu. 2009. Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Transactions on Vehicular Technology 58, 7 (2009), 3508--3517.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Optimized CL-PKE with lightweight encryption for resource constrained devices

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ICDCN '19: Proceedings of the 20th International Conference on Distributed Computing and Networking
        January 2019
        535 pages
        ISBN:9781450360944
        DOI:10.1145/3288599
        • General Chairs:
        • R. C. Hansdah,
        • Dilip Krishnaswamy,
        • Nitin Vaidya

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 January 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader