Aceleração de Assinaturas Baseadas em Atributos para Internet das Coisas
Abstract
The integration of resource-constrained devices into IoT domains depends on a cryptographic foundation that enables the establishment of the essential security mechanisms. Attribute-based Signatures (ABS) are an elegant option to implement an authentication and authorization scheme. This work discusses different approaches to speed up ABS considering as the target platform the resource-constrained devices on IoT domains.References
Abdul-Ghani, H. A., Konstantas, D., and Mahyoub, M. (2018). A comprehensive IoT attacks survey based on a building-blocked reference model. IJACSA’18.
Amdahl, G. M. (1967). Validity of the single processor approach to achieving large scale computing capabilities. In SJCC’67.
Aranha, D. F., Oliveira, L. B., Lopez, J., and Dahab, R. (2009). NanoPBC: implementing cryptographic pairings on an 8-bit platform. In CHiLE’09.
Barreto, P. S. L. M. and Naehrig, M. (2005). Pairing-friendly Elliptic Curves of Prime Order. In SAC’05.
Gouvêa, C. P., Oliveira, L. B., and López, J. (2012). Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller. JCEN’12.
Gouvêa, C. P. L. and López, J. (2009). Software implementation of pairing-based cryptography on sensor networks using the MSP430 microcontroller. In Indocrypt’09.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In CCS’06.
Graham, S. L., Kessler, P. B., and Mckusick, M. K. (1982). Gprof: A call graph execution profiler. In SIGPLAN’82.
Joux, A. (2013). A new index calculus algorithm with complexity l(1=4 + o(1)) in small characteristic. In SAC’13.
Neto, A. L. M., Souza, A. L. F., Cunha, I., Nogueira, M., Nunes, I. O., Cotta, L., Gentille, N., Loureiro, A. A. F., Aranha, D. F., Patil, H. K., and Oliveira, L. B. (2016). AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. In Sensys’16.
Oliveira, L. B., Aranha, D., Morais, E., Daguano, F., López, J., and Dahab, R. (2007).
TinyTate: Computing the tate pairing in resource-constrained nodes. In NCA’07.
Oliveira, L. B. and Dahab, R. (2006). Pairing-based cryptography for sensor networks. In NCA’06.
Oliveira, L. B., Scott, M., Lopez, J., and Dahab, R. (2008). TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks. In INSS’08.
Sakai, R., Ohgishi, K., and Kasahara, M. (2000). Cryptosystems Based on Pairing. In SCIS’00.
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. Unterluggauer, T. and Wenger, E. (2014). Efficient pairings and ECC for embedded systems. In CHES’14.
Weiser, M. (1991). The computer for the 21 st century. Scientific American.
Amdahl, G. M. (1967). Validity of the single processor approach to achieving large scale computing capabilities. In SJCC’67.
Aranha, D. F., Oliveira, L. B., Lopez, J., and Dahab, R. (2009). NanoPBC: implementing cryptographic pairings on an 8-bit platform. In CHiLE’09.
Barreto, P. S. L. M. and Naehrig, M. (2005). Pairing-friendly Elliptic Curves of Prime Order. In SAC’05.
Gouvêa, C. P., Oliveira, L. B., and López, J. (2012). Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller. JCEN’12.
Gouvêa, C. P. L. and López, J. (2009). Software implementation of pairing-based cryptography on sensor networks using the MSP430 microcontroller. In Indocrypt’09.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In CCS’06.
Graham, S. L., Kessler, P. B., and Mckusick, M. K. (1982). Gprof: A call graph execution profiler. In SIGPLAN’82.
Joux, A. (2013). A new index calculus algorithm with complexity l(1=4 + o(1)) in small characteristic. In SAC’13.
Neto, A. L. M., Souza, A. L. F., Cunha, I., Nogueira, M., Nunes, I. O., Cotta, L., Gentille, N., Loureiro, A. A. F., Aranha, D. F., Patil, H. K., and Oliveira, L. B. (2016). AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. In Sensys’16.
Oliveira, L. B., Aranha, D., Morais, E., Daguano, F., López, J., and Dahab, R. (2007).
TinyTate: Computing the tate pairing in resource-constrained nodes. In NCA’07.
Oliveira, L. B. and Dahab, R. (2006). Pairing-based cryptography for sensor networks. In NCA’06.
Oliveira, L. B., Scott, M., Lopez, J., and Dahab, R. (2008). TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks. In INSS’08.
Sakai, R., Ohgishi, K., and Kasahara, M. (2000). Cryptosystems Based on Pairing. In SCIS’00.
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. Unterluggauer, T. and Wenger, E. (2014). Efficient pairings and ECC for embedded systems. In CHES’14.
Weiser, M. (1991). The computer for the 21 st century. Scientific American.
Published
2019-09-02
How to Cite
MAIA NETO, Antonio; RICHARDSON, Stephen; HOROWITZ, Mark; OLIVEIRA, Leonardo.
Aceleração de Assinaturas Baseadas em Atributos para Internet das Coisas. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 19. , 2019, São Paulo.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2019
.
p. 427-432.
DOI: https://doi.org/10.5753/sbseg.2019.13993.
