Criptografia Baseada em Identidade: Uma Análise Comparativa sob a Perspectiva da Internet das Coisas
ResumoIdentity-Based Cryptography (IBC) employs user's identity as public key, eliminating digital certificates. IBC is promising in constrained environments as Internet of Things (IoT) due to its benefits, such as facilitating public key management. However, different aspects on IBC (e.g. the need for bilinear pairing) require attention when applied to IoT in order to meet basic security requirements on these environments. This paper presents a comparative analysis of identity-based cryptosystems considering their application in IoT. The main characteristics of IoT serve as reference for the analysis. Hence, this paper contributes giving an overview about the benefits and drawbacks of the main identity-based cryptosystems on IoT.
Boneh, D., Gentry, C., and Hamburg, M. (2007). Space-efficient identity based encryption without pairings. In FOCS’07, pages 647–657.
Cao, X., Kou, W., and Du, X. (2010). A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences, 180(15):2895–2903.
Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In 8th IMA Int’l Conference on Cryptography and Coding, pages 360–363. Springer-Verlag.
Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., and Yoo, S. (2004). Secure key issuing in id-based cryptography. In Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, pages 69–74.
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84, pages 47–53. Springer-Verlag.
Sicari, S., Rizzardi, A., Grieco, L., and Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Comp. Networks, 76:146 – 164.