Mostrar el registro sencillo del objeto digital

dc.contributor.author Martinez Ramos, Jose Luis
dc.contributor.author LOPEZ GARCIA, LOURDES
dc.contributor.author RODRIGUEZ HENRIQUEZ, FRANCISCO JOSE RAMBO
dc.creator Martinez Ramos, Jose Luis;#0000-0002-3946-9848
dc.creator LOPEZ GARCIA, LOURDES; 901504
dc.creator RODRIGUEZ HENRIQUEZ, FRANCISCO JOSE RAMBO; 31912
dc.date.accessioned 2016-08-04T19:22:29Z
dc.date.available 2016-08-04T19:22:29Z
dc.date.issued 2011-12-01
dc.identifier.citation Martínez-Ramos, L., López-García, L., & Rodríguez-Henríquez, F.. (2011). Achieving Identity-Based Cryptography in a Personal Digital Assistant Device. Journal of applied research and technology, 9(3), 324-334. es
dc.identifier.issn 1665-6424
dc.identifier.uri http://hdl.handle.net/20.500.11799/49973
dc.description.abstract Continuous technological advances have allowed that mobile devices, such as Personal Digital Assistants (PDAs), can execute sophisticated applications that more often than not must be equipped with a layer of security that should include the confidentiality and the authentication services within its repertory. Nevertheless, when compared against front-end computing devices, most PDAs are still seen as constrained devices with limited processing and storage capabilities. In order to achieve Identity-Based Cryptography (IBC), which was an open problem proposed by Adi Shamir in 1984, Boneh and Franklin presented in Crypto 2001, a solution that uses bilinear pairings as its main building block. Since then, IBC has become an active area of investigation where many efficient IBC security protocols are proposed year after year. In this paper, we present a cryptographic application that allows the secure exchange of documents from a Personal Digital Assistant (PDA) that is wirelessly connected to other nodes. The architecture of our application is inspired by the traditional PGP (Pretty Good Privacy) email security protocol. Our application achieves identity-based authentication and confidentiality functionalities at the 80-bit security level through the usage of a cryptographic library that was coded in C++. Our library can perform basic primitives such as bilinear pairings defined over the binary field and the ternary field , as well as other required primitives known as map-to-point hash functions. We report the timings achieved by our application and we show that they compare well against other similar works published in the open literature. es
dc.language.iso eng es
dc.publisher Universidad Autónoma del Estado de México es
dc.relation.ispartofseries Vol.;9
dc.rights openAccess es
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/4.0
dc.subject Identity-based cryptopgraphy es
dc.subject bilinear pairings es
dc.subject PGP es
dc.subject mobile devices es
dc.subject.classification CIENCIAS SOCIALES
dc.title Achieving Identity-based cryptography in a personal digital assistant es
dc.type Artículo es
dc.provenance Científica es
dc.road Dorada es
dc.organismo Centro Universitario UAEM Valle de Chalco es
dc.ambito Nacional es
dc.audience students
dc.audience researchers
dc.type.conacyt article
dc.identificator 5


Ficheros en el objeto digital

Este ítem aparece en la(s) siguiente(s) colección(ones)

Visualización del Documento

  • Título
  • Achieving Identity-based cryptography in a personal digital assistant
  • Autor
  • Martinez Ramos, Jose Luis
  • LOPEZ GARCIA, LOURDES
  • RODRIGUEZ HENRIQUEZ, FRANCISCO JOSE RAMBO
  • Fecha de publicación
  • 2011-12-01
  • Editor
  • Universidad Autónoma del Estado de México
  • Tipo de documento
  • Artículo
  • Palabras clave
  • Identity-based cryptopgraphy
  • bilinear pairings
  • PGP
  • mobile devices
  • Los documentos depositados en el Repositorio Institucional de la Universidad Autónoma del Estado de México se encuentran a disposición en Acceso Abierto bajo la licencia Creative Commons: Atribución-NoComercial-SinDerivar 4.0 Internacional (CC BY-NC-ND 4.0)

Mostrar el registro sencillo del objeto digital

openAccess Excepto si se señala otra cosa, la licencia del ítem se describe cómo openAccess

Buscar en RI


Buscar en RI

Usuario

Estadísticas