Storage and computation optimization of public-key schemes on embedded devices

被引:0
作者
Winderickx, Jori [1 ]
Braeken, An [2 ]
Mentens, Nele [1 ]
机构
[1] Katholieke Univ Leuven, COSIC, IMEC, Leuven, Belgium
[2] Vrije Univ Brussel, Ind Engn INDI, Brussels, Belgium
来源
2018 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH) | 2018年
关键词
Internet of Things; Digital signature; Public-key cryptography; Signcryption; Schnorr; Health sensor platform; Storage encryption; Precomputation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of this work is to provide efficient implementations of digital signature and signcryption schemes on an embedded processor with limited capabilities in terms of storage and computation power. The considered schemes are based on public-key cryptography, more particularly elliptic curve cryptography, and are therefore typically challenging to implement due to high storage and computation requirements. Therefore, we apply a number of optimization methods to minimize the size of the stored data and/or the cycle count for the computation of the algorithms. We implement and evaluate the proposed techniques on a health sensor platform, and we additionally apply storage encryption, resulting in 11 implementation variants of the considered schemes.
引用
收藏
页数:8
相关论文
共 17 条
  • [1] [Anonymous], 2001, FIPS PUB, V197
  • [2] [Anonymous], 2018, MAXREFDES 100 HLTH S
  • [3] Lightweight collaborative key establishment scheme for the Internet of Things
    Ben Saied, Yosra
    Olivereau, Alexis
    Zeghlache, Djamal
    Laurent, Maryline
    [J]. COMPUTER NETWORKS, 2014, 64 : 273 - 295
  • [4] Braeken A., 2017, 2017 3 INT C CLOUD C, P1
  • [5] Certicom Research, 2013, STANDARDS EFFICIENT, V1
  • [6] Certicom Research, 2009, STANDARDS EFFICIENT, V2
  • [7] Dworkin M.J., 2004, SP 800 38C RECOMMEND
  • [8] FIPS PUB, 2012, FIPS PUB, V180
  • [9] Hankerson D., 2006, Guide to Elliptic Curve Cryptography
  • [10] Hedabou M., 2004, COMB METHOD RENDER E, P1