The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
ARM Architecture Reference Manual
ARM Architecture Reference Manual
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
SPINS: security protocols for sensor networks
Wireless Networks
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
Identity-Based Encryption for Sensor Networks
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
Efficient computation of tate pairing in projective coordinate over general characteristic fields
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Field inversion and point halving revisited
IEEE Transactions on Computers
Implementing cryptographic pairings
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
How to secure multi-domain wireless mesh networks
Wireless Networks
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Compact identity-based encryption without strong symmetric cipher
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Information Sciences: an International Journal
Energy-Efficient cryptographic engineering paradigm
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Group-signature schemes on constrained devices: the gap between theory and practice
Proceedings of the First Workshop on Cryptography and Security in Computing Systems
Hi-index | 0.00 |
Recent research results have shown that Elliptic Curve Cryptography (ECC) is feasible on resource constrained sensor nodes. In this work we demonstrate that the related but more complex primitives of Pairing Based Cryptography(PBC) are also well suited for sensor devices. We present the first in-depth study on the application and implementation of PBC to Wireless Sensor Networks (WSNs). Our implementations are all the fastest yet reported, and have been implemented across a range of WSN processors. On a system level we investigate the application of a simple non-interactive key exchange scheme that is particularly suitable for many WSN scenarios. We also present a novel variant of the key exchange protocol which can be useful in even more demanding applications, and which partially solves the problem of node compromise attacks.