Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks

被引:31
作者
Naresh, Vankamamidi S. [1 ]
Sivaranjani, Reddi [2 ]
Murthy, Nistala V. E. S. [3 ]
机构
[1] Sri Vasavi Engn Coll, Dept Comp Sci & Engn, Tadepalligudeam 534101, Andhra Pradesh, India
[2] Anil Neerukonda Inst Technol & Sci, Dept Comp Sci & Engn, Visakhapatnam 530003, Andhra Pradesh, India
[3] Andhra Univ, Dept Math, Visakhapatnam 530003, Andhra Pradesh, India
关键词
Diffie-Hellman; elliptic curve; genus; hyper elliptic curve; Jacobian; wireless sensor networks; CRYPTOGRAPHY;
D O I
10.1002/dac.3763
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is widely believed that hyper elliptic curve cryptosystems (HECCs) are not attractive for wireless sensor network because of their complexity compared with systems based on lower genera, especially elliptic curves. Our contribution shows that for low cost security applications HECs cryptosystems can outperform elliptic curve cryptosystems. The aim of this paper is to propose a discrete logarithm problem-based lightweight secure communication system using HEC. We propose this for different genus curves over varied prime fields performing a full scale study of their adaptability to various types of constrained networks. Also, we propose to evaluate the performance of the protocol for computational times with respect to different genus for main operations like Jacobian, Divisor identifications, key generation, signature generation/verification, message encryption, and decryption by changing the size of the field. A formal security model was established based on the hardness of HEC-Decision Diffie-Hellman (HEC-DDH). Finally, a comparative analysis with ECC-based cryptosystems was made, and satisfactory results were obtained.
引用
收藏
页数:16
相关论文
共 27 条
  • [1] [Anonymous], 2012, MATH PUBLIC KEY CRYP
  • [2] [Anonymous], 2001, INT C THEORY APPL CR, DOI DOI 10.1007/3-540-45682-1_30
  • [3] Avanzi CR, 2006, HDB ELLIPTIC HYPEREL
  • [4] Hyper-and-elliptic-curve cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    [J]. LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2014, 17 : 181 - 202
  • [5] Bernstein DJ, 2014, LECT NOTES COMPUT SC, V8873, P317, DOI 10.1007/978-3-662-45611-8_17
  • [6] Bos JW, 2013, LECT NOTES COMPUT SC, V7881, P194, DOI 10.1007/978-3-642-38348-9_12
  • [7] CANTOR DG, 1987, MATH COMPUT, V48, P95, DOI 10.1090/S0025-5718-1987-0866101-0
  • [8] Ch SA, 2011, HONET 2011
  • [9] Costello C., 2012, Selected Areas in Cryptography, P92, DOI [10.1007/978-3-642-28496-06, DOI 10.1007/978-3-642-28496-06]
  • [10] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654