Efficient implementation of pairing on BREW mobile phones

Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Many implementations of pairings on embedded devices such as mobile phones, sensor nodes, and smart cards have been developed. However, pairings at the security level equivalent to 128-bit AES key have not been implemented in mobile phones without a high-level OS such as Windows. The R-ate pairing is one of the fastest pairings over large prime fields. In this study, we implemented the R-ate pairing at the security level equivalent to 128-bit AES key on BREW mobile phones. We compared the processing time of the R-ate pairing with those of the Ate pairing and η T pairing. In the results, the R-ate pairing was fastest pairing. Also, we compared the processing time of pairings with those of RSA and ECC on ARM9 225MHz. In the result, the processing time of the R-ate pairing was similar those of RSA and ECC.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Proceedings
Pages326-336
Number of pages11
DOIs
Publication statusPublished - Dec 16 2010
Event5th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2010 - Kobe, Japan
Duration: Nov 22 2010Nov 24 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6434 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2010
CountryJapan
CityKobe
Period11/22/1011/24/10

Fingerprint

Mobile Phone
Efficient Implementation
Mobile phones
Pairing
Processing
Smart cards
Sensor nodes
Smart Card
Sensor

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Iyama, T., Kiyomoto, S., Fukushima, K., Tanaka, T., & Takagi, T. (2010). Efficient implementation of pairing on BREW mobile phones. In Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Proceedings (pp. 326-336). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6434 LNCS). https://doi.org/10.1007/978-3-642-16825-3_22

Efficient implementation of pairing on BREW mobile phones. / Iyama, Tadashi; Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki; Takagi, Tsuyoshi.

Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Proceedings. 2010. p. 326-336 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6434 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Iyama, T, Kiyomoto, S, Fukushima, K, Tanaka, T & Takagi, T 2010, Efficient implementation of pairing on BREW mobile phones. in Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6434 LNCS, pp. 326-336, 5th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2010, Kobe, Japan, 11/22/10. https://doi.org/10.1007/978-3-642-16825-3_22
Iyama T, Kiyomoto S, Fukushima K, Tanaka T, Takagi T. Efficient implementation of pairing on BREW mobile phones. In Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Proceedings. 2010. p. 326-336. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-16825-3_22
Iyama, Tadashi ; Kiyomoto, Shinsaku ; Fukushima, Kazuhide ; Tanaka, Toshiaki ; Takagi, Tsuyoshi. / Efficient implementation of pairing on BREW mobile phones. Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Proceedings. 2010. pp. 326-336 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{dadbd17906f44c4b861e574f382e8840,
title = "Efficient implementation of pairing on BREW mobile phones",
abstract = "Many implementations of pairings on embedded devices such as mobile phones, sensor nodes, and smart cards have been developed. However, pairings at the security level equivalent to 128-bit AES key have not been implemented in mobile phones without a high-level OS such as Windows. The R-ate pairing is one of the fastest pairings over large prime fields. In this study, we implemented the R-ate pairing at the security level equivalent to 128-bit AES key on BREW mobile phones. We compared the processing time of the R-ate pairing with those of the Ate pairing and η T pairing. In the results, the R-ate pairing was fastest pairing. Also, we compared the processing time of pairings with those of RSA and ECC on ARM9 225MHz. In the result, the processing time of the R-ate pairing was similar those of RSA and ECC.",
author = "Tadashi Iyama and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka and Tsuyoshi Takagi",
year = "2010",
month = "12",
day = "16",
doi = "10.1007/978-3-642-16825-3_22",
language = "English",
isbn = "3642168248",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "326--336",
booktitle = "Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Proceedings",

}

TY - GEN

T1 - Efficient implementation of pairing on BREW mobile phones

AU - Iyama, Tadashi

AU - Kiyomoto, Shinsaku

AU - Fukushima, Kazuhide

AU - Tanaka, Toshiaki

AU - Takagi, Tsuyoshi

PY - 2010/12/16

Y1 - 2010/12/16

N2 - Many implementations of pairings on embedded devices such as mobile phones, sensor nodes, and smart cards have been developed. However, pairings at the security level equivalent to 128-bit AES key have not been implemented in mobile phones without a high-level OS such as Windows. The R-ate pairing is one of the fastest pairings over large prime fields. In this study, we implemented the R-ate pairing at the security level equivalent to 128-bit AES key on BREW mobile phones. We compared the processing time of the R-ate pairing with those of the Ate pairing and η T pairing. In the results, the R-ate pairing was fastest pairing. Also, we compared the processing time of pairings with those of RSA and ECC on ARM9 225MHz. In the result, the processing time of the R-ate pairing was similar those of RSA and ECC.

AB - Many implementations of pairings on embedded devices such as mobile phones, sensor nodes, and smart cards have been developed. However, pairings at the security level equivalent to 128-bit AES key have not been implemented in mobile phones without a high-level OS such as Windows. The R-ate pairing is one of the fastest pairings over large prime fields. In this study, we implemented the R-ate pairing at the security level equivalent to 128-bit AES key on BREW mobile phones. We compared the processing time of the R-ate pairing with those of the Ate pairing and η T pairing. In the results, the R-ate pairing was fastest pairing. Also, we compared the processing time of pairings with those of RSA and ECC on ARM9 225MHz. In the result, the processing time of the R-ate pairing was similar those of RSA and ECC.

UR - http://www.scopus.com/inward/record.url?scp=78650030510&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78650030510&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-16825-3_22

DO - 10.1007/978-3-642-16825-3_22

M3 - Conference contribution

AN - SCOPUS:78650030510

SN - 3642168248

SN - 9783642168246

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 326

EP - 336

BT - Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Proceedings

ER -