We discuss the implementation over elliptic curves of a key agreement protocol for the Raspberry PI platform. The protocol requires just one round to derive an (implicit) authenticated session key, and it makes use of identity-based cryptography, which fits very well some application scenarios, allowing for more efficiency than the certificate-based approach. We run a set of tests in order to verify the correctness of our implementation and to measure its performances in term of computing time.
Implementing Identity-based Key Agreement in Embedded Devices
2015
Abstract
We discuss the implementation over elliptic curves of a key agreement protocol for the Raspberry PI platform. The protocol requires just one round to derive an (implicit) authenticated session key, and it makes use of identity-based cryptography, which fits very well some application scenarios, allowing for more efficiency than the certificate-based approach. We run a set of tests in order to verify the correctness of our implementation and to measure its performances in term of computing time.File in questo prodotto:
Non ci sono file associati a questo prodotto.
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


