2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems 2011
DOI: 10.1109/mass.2011.77
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices

Abstract: Elliptic Curve Cryptography (ECC) is an attractive alternative to conventional public key cryptography, such as RSA. ECC is an ideal candidate for implementation on constrained devices where the major computational resources i.e. speed, memory are limited and low-power wireless communication protocols are employed. That is because it attains the same security levels with traditional cryptosystems using smaller parameter sizes. Moreover, in several application areas such as person identification and eVoting, it… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(20 citation statements)
references
References 25 publications
0
20
0
Order By: Relevance
“…NTRU consists of the less computational asymmetric approach based on the shortest vector problem in a lattice [94], however it requires more memory space to store keys. Elliptic curves are also in some cases very efficient and can ensure the same level of security as RSA and similar asymmetric cryptographic approaches with keys of small sizes [28]. Indeed, with 80-bit security level, we need only keys of 160 bit contrary to RSA where we need keys of 1024 bits.…”
Section: Traditional Public Key Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…NTRU consists of the less computational asymmetric approach based on the shortest vector problem in a lattice [94], however it requires more memory space to store keys. Elliptic curves are also in some cases very efficient and can ensure the same level of security as RSA and similar asymmetric cryptographic approaches with keys of small sizes [28]. Indeed, with 80-bit security level, we need only keys of 160 bit contrary to RSA where we need keys of 1024 bits.…”
Section: Traditional Public Key Solutionsmentioning
confidence: 99%
“…The idea behind ZKP is to allow to one party (prover) to demonstrate to another party (verifier) some property by proving its possessing of some information without disclosing it [28]. This concept is very useful to develop security protocols while preserving the privacy of users' data and properties.…”
Section: Data Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…These huge differences make very difficult to compare among different implementations, at least that they have tested over the same architecture and exploiting the same features. For example, it can be found an implementation of ECC for MSP430 and JN5139 in [13] which presents a very low performance, since it is implemented over the WiseBed Operating System. Therefore, even when they are using the same architecture the results are highly different because they are not being able to exploit the main benefits from the architecture.…”
Section: Discussionmentioning
confidence: 99%
“…ECC are useful in the implementation on constrained devices where the major computational resources such as speed, memory is limited and low-power wireless communication protocols are used. That is because it attains the same security levels with traditional cryptosystems using smaller parameter sizes as discussed in [16] [31]. Some of the advantages and disadvantage of this method is: Advantages:  Very few attributes are required compared to traditional cryptographic approaches…”
Section: Elliptical Curve Cryptographic Based Ppdmmentioning
confidence: 99%