{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1390001204377967232.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1587/transinf.e92.d.909"}},{"identifier":{"@type":"HDL","@value":"http://hdl.handle.net/10445/4850"}},{"identifier":{"@type":"URI","@value":"https://fun.repo.nii.ac.jp/records/1113"}},{"identifier":{"@type":"URI","@value":"http://www.jstage.jst.go.jp/article/transinf/E92.D/5/E92.D_5_909/_pdf"}},{"identifier":{"@type":"NAID","@value":"10026809094"}}],"resourceType":"学術雑誌論文(journal article)","dc:title":[{"@language":"en","@value":"Efficient Implementation of Pairing-Based Cryptography on a Sensor Node"}],"dc:language":"en","description":[{"type":"abstract","notation":[{"@language":"en","@value":"Pairing-based cryptography provides us many novel cryptographic applications such as ID-based cryptosystems and efficient broadcast encryptions. The security problems in ubiquitous sensor networks have been discussed in many papers, and pairing-based cryptography is a crucial technique to solve them. Due to the limited resources in the current sensor node, it is challenged to optimize the implementation of pairings on sensor nodes. In this paper we present an efficient implementation of pairing over MICAz, which is widely used as a sensor node for ubiquitous sensor network. We improved the speed of η<i><sub>T</sub></i> pairing by using a new efficient multiplication specialized for ATmega128L, called <i>the block comb method</i> and several optimization techniques to save the number of data load/store operations. The timing of η<i><sub>T</sub></i> pairing over <i>GF</i>(2<sup>239</sup>) achieves about 1.93sec, which is the fastest implementation of pairing over MICAz to the best of our knowledge. From our dramatic improvement, we now have much high possibility to make pairing-based cryptography for ubiquitous sensor networks practical."}],"abstractLicenseFlag":"disallow"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1410001204377967233","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000017682234"}],"foaf:name":[{"@language":"en","@value":"MIYAZAKI Yukinori"}],"jpcoar:affiliationName":[{"@language":"en","@value":"Future University Hakodate (FUN)"}]},{"@id":"https://cir.nii.ac.jp/crid/1410001204377967232","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000006379950"}],"foaf:name":[{"@language":"en","@value":"SHIRASE Masaaki"}],"jpcoar:affiliationName":[{"@language":"en","@value":"Future University Hakodate (FUN)"}]},{"@id":"https://cir.nii.ac.jp/crid/1410001204377967236","@type":"Researcher","foaf:name":[{"@language":"en","@value":"HAN Dong-Guk"}],"jpcoar:affiliationName":[{"@language":"en","@value":"Dept. of Mathematics, Kookmin University"}]},{"@id":"https://cir.nii.ac.jp/crid/1420001326233885312","@type":"Researcher","personIdentifier":[{"@type":"KAKEN_RESEARCHERS","@value":"60404802"},{"@type":"NRID","@value":"1000060404802"},{"@type":"CINII_AUTHOR_ID","@value":"DA19404071"},{"@type":"URI","@value":"https://ci.nii.ac.jp/author/DA19404071#entity"},{"@type":"URI","@value":"https://viaf.org/viaf/NII%7CDA19404071"},{"@type":"NRID","@value":"9000005103545"},{"@type":"NRID","@value":"9000004831061"},{"@type":"NRID","@value":"9000019022251"},{"@type":"NRID","@value":"9000014296352"},{"@type":"NRID","@value":"9000004831045"},{"@type":"NRID","@value":"9000415427083"},{"@type":"NRID","@value":"9000019056337"},{"@type":"NRID","@value":"9000017681465"},{"@type":"NRID","@value":"9000018592966"},{"@type":"NRID","@value":"9000261018583"},{"@type":"NRID","@value":"9000378127298"},{"@type":"NRID","@value":"9000307257909"},{"@type":"NRID","@value":"9000287168117"},{"@type":"NRID","@value":"9000405756792"},{"@type":"NRID","@value":"9000404318646"},{"@type":"NRID","@value":"9000019135097"},{"@type":"NRID","@value":"9000005103569"},{"@type":"NRID","@value":"9000005103603"},{"@type":"NRID","@value":"9000405894630"},{"@type":"NRID","@value":"9000415230816"},{"@type":"NRID","@value":"9000017688700"},{"@type":"NRID","@value":"9000242085441"},{"@type":"NRID","@value":"9000409633655"},{"@type":"NRID","@value":"9000259338936"},{"@type":"NRID","@value":"9000004489161"},{"@type":"NRID","@value":"9000243893282"},{"@type":"NRID","@value":"9000404099198"},{"@type":"NRID","@value":"9000415203209"},{"@type":"NRID","@value":"9000378127278"},{"@type":"NRID","@value":"9000300212071"},{"@type":"NRID","@value":"9000019135113"},{"@type":"NRID","@value":"9000004831035"},{"@type":"NRID","@value":"9000242085436"},{"@type":"NRID","@value":"9000409886198"},{"@type":"NRID","@value":"9000391689236"},{"@type":"NRID","@value":"9000391688048"},{"@type":"NRID","@value":"9000399239003"},{"@type":"NRID","@value":"9000272999909"},{"@type":"NRID","@value":"9000297488040"},{"@type":"NRID","@value":"9000375905531"},{"@type":"NRID","@value":"9000275822564"},{"@type":"NRID","@value":"9000345215390"},{"@type":"NRID","@value":"9000405756405"},{"@type":"NRID","@value":"9000287188987"},{"@type":"NRID","@value":"9000413570805"},{"@type":"NRID","@value":"9000410315882"},{"@type":"NRID","@value":"9000258204957"},{"@type":"NRID","@value":"9000016260051"},{"@type":"NRID","@value":"9000022974928"},{"@type":"NRID","@value":"9000365541637"},{"@type":"NRID","@value":"9000347162209"},{"@type":"NRID","@value":"9000403156196"},{"@type":"NRID","@value":"9000265257411"},{"@type":"NRID","@value":"9000283209793"},{"@type":"NRID","@value":"9000004831041"},{"@type":"NRID","@value":"9000242085357"},{"@type":"NRID","@value":"9000404099493"},{"@type":"NRID","@value":"9000258118745"},{"@type":"RESEARCHMAP","@value":"https://researchmap.jp/tsuyoshi.takagi"}],"foaf:name":[{"@language":"en","@value":"TAKAGI Tsuyoshi"}],"jpcoar:affiliationName":[{"@language":"en","@value":"Future University Hakodate (FUN)"}]},{"@id":"https://cir.nii.ac.jp/crid/1410001204377967235","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000017682237"}],"foaf:name":[{"@language":"en","@value":"CHOI Dooho"}],"jpcoar:affiliationName":[{"@language":"en","@value":"Electronics and Telecommunications Research Institute (ETRI)"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"09168532"},{"@type":"EISSN","@value":"17451361"},{"@type":"NCID","@value":"AA10826272"}],"prism:publicationName":[{"@language":"en","@value":"IEICE Transactions on Information and Systems"},{"@language":"en","@value":"IEICE Trans. Inf. & Syst."}],"dc:publisher":[{"@language":"en","@value":"The Institute of Electronics, Information and Communication Engineers"},{"@language":"ja","@value":"一般社団法人 電子情報通信学会"}],"prism:publicationDate":"2009","prism:volume":"E92-D","prism:number":"5","prism:startingPage":"909","prism:endingPage":"917"},"reviewed":"false","dcterms:accessRights":"http://purl.org/coar/access_right/c_abf2","url":[{"@id":"https://fun.repo.nii.ac.jp/records/1113"},{"@id":"http://www.jstage.jst.go.jp/article/transinf/E92.D/5/E92.D_5_909/_pdf"},{"@id":"http://hdl.handle.net/10445/4850"}],"availableAt":"2009","foaf:topic":[{"@id":"https://cir.nii.ac.jp/all?q=%CE%B7%3Ci%3E%3Csub%3ET%3C/sub%3E%3C/i%3E%20pairing","dc:title":"η<i><sub>T</sub></i> pairing"},{"@id":"https://cir.nii.ac.jp/all?q=sensor%20node","dc:title":"sensor node"},{"@id":"https://cir.nii.ac.jp/all?q=ATmega128L","dc:title":"ATmega128L"},{"@id":"https://cir.nii.ac.jp/all?q=finite%20field%20multiplication","dc:title":"finite field multiplication"},{"@id":"https://cir.nii.ac.jp/all?q=assembly%20implementation","dc:title":"assembly implementation"}],"relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1050574047104174080","@type":"Article","resourceType":"会議発表資料(conference paper)","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation"}]},{"@id":"https://cir.nii.ac.jp/crid/1360574095204327808","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Security in wireless sensor networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1360855570247452416","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p – x + d"}]},{"@id":"https://cir.nii.ac.jp/crid/1361137045896096512","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Efficient Hardware for the Tate Pairing Calculation in Characteristic Three"}]},{"@id":"https://cir.nii.ac.jp/crid/1361418518587260928","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Explicit Formulas for Efficient Multiplication in $\\mathbb{F}_{3^{6m}}$"}]},{"@id":"https://cir.nii.ac.jp/crid/1361418520441908864","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys"}]},{"@id":"https://cir.nii.ac.jp/crid/1361981468614314624","@type":"Article","relationType":["references","cites"],"jpcoar:relatedTitle":[{"@value":"Efficient pairing computation on supersingular Abelian varieties"}]},{"@id":"https://cir.nii.ac.jp/crid/1362262944290120704","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"TinyPK"}]},{"@id":"https://cir.nii.ac.jp/crid/1362262944750261888","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Computing Cryptographic Algorithms in Portable and Embedded Devices"}]},{"@id":"https://cir.nii.ac.jp/crid/1362262945789422080","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1362544420319992576","@type":"Article","relationType":["references","cites"],"jpcoar:relatedTitle":[{"@value":"Identity-Based Encryption from the Weil Pairing"}]},{"@id":"https://cir.nii.ac.jp/crid/1362825895614614272","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1363388843470215424","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"FPGA accelerated tate pairing based cryptosystems over binary fields"}]},{"@id":"https://cir.nii.ac.jp/crid/1363670321163872896","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Efficient Algorithms for Pairing-Based Cryptosystems"}]},{"@id":"https://cir.nii.ac.jp/crid/1364233268563257088","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"On Small Characteristic Algebraic Tori in Pairing-Based Cryptography"}]},{"@id":"https://cir.nii.ac.jp/crid/1390001204377712896","@type":"Article","relationType":["references","cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282679354707328","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282681288305024","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing"},{"@value":"Reduction Optimal Trinomials for Efficient Software Implementation of the  T Pairing"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282681288879104","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["references"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Some Efficient Algorithms for the Final Exponentiation of ηT Pairing"},{"@value":"Some Efficient Algorithms for the Final Exponentiation of etaT Pairing"},{"@value":"Some Efficient Algorithms for the Final Exponentiation of  T Pairing"}]},{"@id":"https://cir.nii.ac.jp/crid/1570009751102049024","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Explicit formulas for efficient multiplication in F_<3^<6m>>"}]},{"@id":"https://cir.nii.ac.jp/crid/1570291226078752896","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"TinyPK : Securing sensor networks with public key technology"}]},{"@id":"https://cir.nii.ac.jp/crid/1570291226078759040","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1570572701055468800","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"FPGA accelerated Tate pairing based cryptosystems over binary fields"}]},{"@id":"https://cir.nii.ac.jp/crid/1570572701055538944","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"An algorithm for the η_T pairing calculation in characteristic three and its hardware implementation"}]},{"@id":"https://cir.nii.ac.jp/crid/1570854176032174592","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1571135651008886528","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Computing cryptographic algorithms in portable and embedded devices"}]},{"@id":"https://cir.nii.ac.jp/crid/1571135651008891776","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"MICAz Hardware Description"}]},{"@id":"https://cir.nii.ac.jp/crid/1571417125985594880","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Some efficient algorithms for the final exponentiation of η_T pairing"}]},{"@id":"https://cir.nii.ac.jp/crid/1571417125985600128","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Tate pairing implementation for hyperelliptic curves y^2=x^p-x+d"}]},{"@id":"https://cir.nii.ac.jp/crid/1571980075939020416","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"NanoECC : Testing the limits of elliptic curve cryptography in Sensor Networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1571980075939023744","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"TinyECC : Elliptic curve cryptography for sensor networks (version 0.3)"}]},{"@id":"https://cir.nii.ac.jp/crid/1572261550915729536","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Efficient hardware for the Tate pairing calculation in characteristic three"}]},{"@id":"https://cir.nii.ac.jp/crid/1572824500869148672","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Hardware implementation of the η_T pairing in characteristic 3"}]},{"@id":"https://cir.nii.ac.jp/crid/1572824500869155584","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"TinyPBC : Pairings for authenticated identity-based non-interactive key distribution in sensor networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1572824500869220096","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Collusion resistant broadcast encryption with short ciphertexts and private keys"}]},{"@id":"https://cir.nii.ac.jp/crid/1573105976572321920","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Security in wireless sensor networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1573387450822569344","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A refined algorithm for the η_T pairing calculation in characteristic three"}]},{"@id":"https://cir.nii.ac.jp/crid/1573668925799280640","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"On small characteristic algebraic tori in pairing-cased cryptography"}]},{"@id":"https://cir.nii.ac.jp/crid/1573668925799281792","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1573668926516602112","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Efficient algorithms for pairing-based cryptosystems"}]},{"@id":"https://cir.nii.ac.jp/crid/1574231875752699648","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Reduction optimal trinomials for efficient software implementation of the η_T pairing"}]},{"@id":"https://cir.nii.ac.jp/crid/1574231875752703616","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Efficient implementation of pairing on sensor nodes"}]},{"@id":"https://cir.nii.ac.jp/crid/1574231875752706688","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"TinyTate : Identity-based encryption for sensor networks"}]}],"dataSourceIdentifier":[{"@type":"JALC","@value":"oai:japanlinkcenter.org:0033013401"},{"@type":"IRDB","@value":"oai:irdb.nii.ac.jp:01406:0005253903"},{"@type":"CROSSREF","@value":"10.1587/transinf.e92.d.909"},{"@type":"CIA","@value":"10026809094"},{"@type":"OPENAIRE","@value":"doi_dedup___::b07f8acd96f3b1e88f54162b18904ba7"},{"@type":"CROSSREF","@value":"10.1587/transinf.e96.d.1875_references_DOI_GJwZJW1Ie4oPQYJY5HboF8uCQi"}]}