Efficient implementation of the pairing on mobilephones using BREW

Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Pairing based cryptography can accomplish novel security applications such as ID-based cryptosystems, which have not been constructed efficiently without the pairing. The processing speed of the pairing based cryptography is relatively slow compared with the other conventional public key cryptography. However, several efficient algorithms for computing the pairing have been proposed, namely Duursmar-Lee algorithm and its variant ηT pairing. In this paper, we present an efficient implementation of the pairing over some mobilephones, and examine the feasibility of the pairing based cryptosystems on ubiquitous devices. Indeed the processing speed of our implementation in ARM9 processors on BREW achieves under 100 milliseconds using the supersingular curve over F397. It has become fast enough for implementing security applications using the pairing on mobilephones.

Original languageEnglish
Title of host publicationInformation Security Applications - 8th International Workshop, WISA 2007, Revised Selected Papers
Pages208-214
Number of pages7
Publication statusPublished - Dec 1 2007
Event8th International Workshop on Information Security Applications, WISA 2007 - Jeju Island, Korea, Republic of
Duration: Aug 27 2007Aug 29 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4867 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other8th International Workshop on Information Security Applications, WISA 2007
CountryKorea, Republic of
CityJeju Island
Period8/27/078/29/07

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Efficient implementation of the pairing on mobilephones using BREW'. Together they form a unique fingerprint.

  • Cite this

    Yoshitomi, M., Takagi, T., Kiyomoto, S., & Tanaka, T. (2007). Efficient implementation of the pairing on mobilephones using BREW. In Information Security Applications - 8th International Workshop, WISA 2007, Revised Selected Papers (pp. 208-214). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4867 LNCS).