TY - GEN
T1 - Efficient implementation of the pairing on mobilephones using BREW
AU - Yoshitomi, Motoi
AU - Takagi, Tsuyoshi
AU - Kiyomoto, Shinsaku
AU - Tanaka, Toshiaki
N1 - Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2007
Y1 - 2007
N2 - Pairing based cryptography can accomplish novel security applications such as ID-based cryptosystems, which have not been constructed efficiently without the pairing. The processing speed of the pairing based cryptography is relatively slow compared with the other conventional public key cryptography. However, several efficient algorithms for computing the pairing have been proposed, namely Duursmar-Lee algorithm and its variant ηT pairing. In this paper, we present an efficient implementation of the pairing over some mobilephones, and examine the feasibility of the pairing based cryptosystems on ubiquitous devices. Indeed the processing speed of our implementation in ARM9 processors on BREW achieves under 100 milliseconds using the supersingular curve over F397. It has become fast enough for implementing security applications using the pairing on mobilephones.
AB - Pairing based cryptography can accomplish novel security applications such as ID-based cryptosystems, which have not been constructed efficiently without the pairing. The processing speed of the pairing based cryptography is relatively slow compared with the other conventional public key cryptography. However, several efficient algorithms for computing the pairing have been proposed, namely Duursmar-Lee algorithm and its variant ηT pairing. In this paper, we present an efficient implementation of the pairing over some mobilephones, and examine the feasibility of the pairing based cryptosystems on ubiquitous devices. Indeed the processing speed of our implementation in ARM9 processors on BREW achieves under 100 milliseconds using the supersingular curve over F397. It has become fast enough for implementing security applications using the pairing on mobilephones.
UR - http://www.scopus.com/inward/record.url?scp=38549135553&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38549135553&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-77535-5_15
DO - 10.1007/978-3-540-77535-5_15
M3 - Conference contribution
AN - SCOPUS:38549135553
SN - 354077534X
SN - 9783540775348
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 208
EP - 214
BT - Information Security Applications - 8th International Workshop, WISA 2007, Revised Selected Papers
PB - Springer Verlag
T2 - 8th International Workshop on Information Security Applications, WISA 2007
Y2 - 27 August 2007 through 29 August 2007
ER -