Efficient implementation of the pairing on mobilephones using BREW

Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)


Pairing based cryptography can accomplish novel security applications such as ID-based cryptosystems, which have not been constructed efficiently without the pairing. The processing speed of the pairing based cryptography is relatively slow compared with the other conventional public key cryptography. However, several efficient algorithms for computing the pairing have been proposed, namely Duursmar-Lee algorithm and its variant ηT pairing. In this paper, we present an efficient implementation of the pairing over some mobilephones, and examine the feasibility of the pairing based cryptosystems on ubiquitous devices. Indeed the processing speed of our implementation in ARM9 processors on BREW achieves under 100 milliseconds using the supersingular curve over F397. It has become fast enough for implementing security applications using the pairing on mobilephones.

Original languageEnglish
Title of host publicationInformation Security Applications - 8th International Workshop, WISA 2007, Revised Selected Papers
PublisherSpringer Verlag
Number of pages7
ISBN (Print)354077534X, 9783540775348
Publication statusPublished - 2007
Externally publishedYes
Event8th International Workshop on Information Security Applications, WISA 2007 - Jeju Island, Korea, Republic of
Duration: Aug 27 2007Aug 29 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4867 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other8th International Workshop on Information Security Applications, WISA 2007
Country/TerritoryKorea, Republic of
CityJeju Island

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Efficient implementation of the pairing on mobilephones using BREW'. Together they form a unique fingerprint.

Cite this