We discuss the implementation over elliptic curves of a key agreement protocol for the Raspberry PI platform. The protocol requires just one round to derive an (implicit) authenticated session key, and it makes use of identity-based cryptography, which fits very well some application scenarios, allowing for more efficiency than the certificate-based approach. We run a set of tests in order to verify the correctness of our implementation and to measure its performances in term of computing time.

Implementing Identity-based Key Agreement in Embedded Devices

2015

Abstract

We discuss the implementation over elliptic curves of a key agreement protocol for the Raspberry PI platform. The protocol requires just one round to derive an (implicit) authenticated session key, and it makes use of identity-based cryptography, which fits very well some application scenarios, allowing for more efficiency than the certificate-based approach. We run a set of tests in order to verify the correctness of our implementation and to measure its performances in term of computing time.
2015
Istituto di Calcolo e Reti ad Alte Prestazioni - ICAR
Group key agreement
Identity-based cryptography
Pairing-based signatures
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/276509
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact