Efficient implementation of pairing on BREW mobile phones

Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Many implementations of pairings on embedded devices such as mobile phones, sensor nodes, and smart cards have been developed. However, pairings at the security level equivalent to 128-bit AES key have not been implemented in mobile phones without a high-level OS such as Windows. The R-ate pairing is one of the fastest pairings over large prime fields. In this study, we implemented the R-ate pairing at the security level equivalent to 128-bit AES key on BREW mobile phones. We compared the processing time of the R-ate pairing with those of the Ate pairing and η T pairing. In the results, the R-ate pairing was fastest pairing. Also, we compared the processing time of pairings with those of RSA and ECC on ARM9 225MHz. In the result, the processing time of the R-ate pairing was similar those of RSA and ECC.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Proceedings
Pages326-336
Number of pages11
DOIs
Publication statusPublished - 2010
Event5th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2010 - Kobe, Japan
Duration: Nov 22 2010Nov 24 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6434 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2010
CountryJapan
CityKobe
Period11/22/1011/24/10

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Efficient implementation of pairing on BREW mobile phones'. Together they form a unique fingerprint.

Cite this