Criptografia Baseada em Identidade: Uma Análise Comparativa sob a Perspectiva da Internet das Coisas

  • Antonio L. Maia Neto UFMG
  • Michele Nogueira UFPR
  • Harsh Kupwade Patil LG Mobile Research
  • Ítalo Cunha UFMG
  • Antonio A. F. Loureiro UFMG
  • Leonardo B. Oliveira UFMG


Identity-Based Cryptography (IBC) employs user's identity as public key, eliminating digital certificates. IBC is promising in constrained environments as Internet of Things (IoT) due to its benefits, such as facilitating public key management. However, different aspects on IBC (e.g. the need for bilinear pairing) require attention when applied to IoT in order to meet basic security requirements on these environments. This paper presents a comparative analysis of identity-based cryptosystems considering their application in IoT. The main characteristics of IoT serve as reference for the analysis. Hence, this paper contributes giving an overview about the benefits and drawbacks of the main identity-based cryptosystems on IoT.


Boneh, D. and Franklin, M. K. (2001). Identity-based encryption from the weil pairing. In CRYPTO ’01, pages 213–229. Springer-Verlag.

Boneh, D., Gentry, C., and Hamburg, M. (2007). Space-efficient identity based encryption without pairings. In FOCS’07, pages 647–657.

Cao, X., Kou, W., and Du, X. (2010). A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences, 180(15):2895–2903.

Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In 8th IMA Int’l Conference on Cryptography and Coding, pages 360–363. Springer-Verlag.

Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., and Yoo, S. (2004). Secure key issuing in id-based cryptography. In Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, pages 69–74.

Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84, pages 47–53. Springer-Verlag.

Sicari, S., Rizzardi, A., Grieco, L., and Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Comp. Networks, 76:146 – 164.
Como Citar

Selecione um Formato
MAIA NETO, Antonio L.; NOGUEIRA, Michele; PATIL, Harsh Kupwade; CUNHA, Ítalo; LOUREIRO, Antonio A. F.; OLIVEIRA, Leonardo B.. Criptografia Baseada em Identidade: Uma Análise Comparativa sob a Perspectiva da Internet das Coisas. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 15. , 2015, Florianópolis. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2015 . p. 326-329. DOI:

Artigos mais lidos do(s) mesmo(s) autor(es)

1 2 3 4 5 6 > >>