Achieving Identity-Based Cryptography in a Personal Digital Assistant Device
نویسندگان
چکیده
Continuous technological advances have allowed that mobile devices, such as Personal Digital Assistants (PDAs), can execute sophisticated applications that more often than not must be equipped with a layer of security that should include the confidentiality and the authentication services within its repertory. Nevertheless, when compared against front-end computing devices, most PDAs are still seen as constrained devices with limited processing and storage capabilities. In order to achieve Identity-Based Cryptography (IBC), which was an open problem proposed by Adi Shamir in 1984, Boneh and Franklin presented in Crypto 2001, a solution that uses bilinear pairings as its main building block. Since then, IBC has become an active area of investigation where many efficient IBC security protocols are proposed year after year. In this paper, we present a cryptographic application that allows the secure exchange of documents from a Personal Digital Assistant (PDA) that is wirelessly connected to other nodes. The architecture of our application is inspired by the traditional PGP (Pretty Good Privacy) email security protocol. Our application achieves identity-based authentication and confidentiality functionalities at the 80-bit security level through the usage of a cryptographic library that was coded in C++. Our library can perform basic primitives such as bilinear pairings defined over the binary field and the ternary field , as well as other required primitives known as map-to-point hash functions. We report the timings achieved by our application and we show that they compare well against other similar works published in the open literature.
منابع مشابه
Device Security
This paper studies requirements for achieving personal trusted devices. Such devices can be for example smart cards or personal digital assistants. We consider both hardware and operating system security. Together they ensure that the device is trustworthy and is able to protect it’s user’s electronic identity (his private key) and data. We study some security problems with smart cards, and giv...
متن کاملGSM Security Using Identity-based Cryptography
Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM support...
متن کاملUnique User - generated Digital Pseudonyms ⋆ Updated : 2007
This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pseudonym locally in his personal security environment, e.g. in his smart card or his personal digital assistant. There is no need for any information interchange between issuing parties or global data (especially keys), except un...
متن کاملOpportunistic Networks
A predominant concern in ubiquitous computing (UC) is the natural and effortless interaction of humans with a smart environment in order to carry out a certain task or simply to make life easier. Often, interaction is bootstrapped with a user’s personal, mobile device. Such a device may carry a digital representation in form of a user profile and a key pair that serves as a digital identity. Ex...
متن کاملConstruction of a Real-Time and Secure Mobile Ticket System
With the technology improving, many content-services have been digitalized constantly in our daily life. To be more convenient and efficient, many kinds of high technological products have also been personalized, mobilized, and people can handle their businesses at any time from anywhere. For example, mobile users can perform the Internet transactions via mobile devices (such as cell phone and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015