dor_id: 45491
506.#.#.a: Público
590.#.#.d: Los artículos enviados a la revista "Journal of Applied Research and Technology", se juzgan por medio de un proceso de revisión por pares
510.0.#.a: Scopus, Directory of Open Access Journals (DOAJ); Sistema Regional de Información en Línea para Revistas Científicas de América Latina, el Caribe, España y Portugal (Latindex); Indice de Revistas Latinoamericanas en Ciencias (Periódica); La Red de Revistas Científicas de América Latina y el Caribe, España y Portugal (Redalyc); Consejo Nacional de Ciencia y Tecnología (CONACyT); Google Scholar Citation
561.#.#.u: https://www.icat.unam.mx/
650.#.4.x: Ingenierías
336.#.#.b: article
336.#.#.3: Artículo de Investigación
336.#.#.a: Artículo
351.#.#.6: https://jart.icat.unam.mx/index.php/jart
351.#.#.b: Journal of Applied Research and Technology
351.#.#.a: Artículos
harvesting_group: RevistasUNAM
270.1.#.p: Revistas UNAM. Dirección General de Publicaciones y Fomento Editorial, UNAM en revistas@unam.mx
590.#.#.c: Open Journal Systems (OJS)
270.#.#.d: MX
270.1.#.d: México
590.#.#.b: Concentrador
883.#.#.u: https://revistas.unam.mx/catalogo/
883.#.#.a: Revistas UNAM
590.#.#.a: Coordinación de Difusión Cultural
883.#.#.1: https://www.publicaciones.unam.mx/
883.#.#.q: Dirección General de Publicaciones y Fomento Editorial
850.#.#.a: Universidad Nacional Autónoma de México
856.4.0.u: https://jart.icat.unam.mx/index.php/jart/article/view/427/423
100.1.#.a: Martínez Ramos, L.; López García, L.; Rodríguez Henríquez, F.
524.#.#.a: Martínez Ramos, L., et al. (2011). Achieving Identity-Based Cryptography in a Personal Digital Assistant Device. Journal of Applied Research and Technology; Vol. 9 Núm. 03. Recuperado de https://repositorio.unam.mx/contenidos/45491
245.1.0.a: Achieving Identity-Based Cryptography in a Personal Digital Assistant Device
502.#.#.c: Universidad Nacional Autónoma de México
561.1.#.a: Instituto de Ciencias Aplicadas y Tecnología, UNAM
264.#.0.c: 2011
264.#.1.c: 2011-12-01
653.#.#.a: Identity-based identity; bilinear pairings; PGP; mobile devices
506.1.#.a: La titularidad de los derechos patrimoniales de esta obra pertenece a las instituciones editoras. Su uso se rige por una licencia Creative Commons BY-NC-SA 4.0 Internacional, https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.es, para un uso diferente consultar al responsable jurídico del repositorio por medio del correo electrónico gabriel.ascanio@icat.unam.mx
884.#.#.k: https://jart.icat.unam.mx/index.php/jart/article/view/427
001.#.#.#: 074.oai:ojs2.localhost:article/427
041.#.7.h: spa
520.3.#.a: Continuous technological advances have allowed that mobile devices, such as Personal Digital Assistants (PDAs), can executesophisticated applications that more often than not must be equipped with a layer of security that should include theconfidentiality and the authentication services within its repertory. Nevertheless, when compared against front-end computingdevices, most PDAs are still seen as constrained devices with limited processing and storage capabilities.In order to achieve Identity-Based Cryptography (IBC), which was an open problem proposed by Adi Shamir in 1984, Bonehand Franklin presented in Crypto 2001, a solution that uses bilinear pairings as its main building block. Since then, IBC hasbecome an active area of investigation where many efficient IBC security protocols are proposed year after year. In this paper, we present a cryptographic application that allows the secure exchange of documents from a Personal Digital Assistant (PDA) that is wirelessly connected to other nodes. The architecture of our application is inspired by the traditional PGP (Pretty Good Privacy) email security protocol. Our application achieves identity-based authentication and confidentiality functionalities at the 80-bit security level through the usage of a cryptographic library that was coded in C++. Our library can perform basic primitives such as bilinear pairings defined over the binary field and the ternary field , as well as other required primitives known as map-to-point hash functions. We report the timings achieved by our application and we show that they compare well against other similar works published in the open literature.
773.1.#.t: Journal of Applied Research and Technology; Vol. 9 Núm. 03
773.1.#.o: https://jart.icat.unam.mx/index.php/jart
022.#.#.a: ISSN electrónico: 2448-6736; ISSN: 1665-6423
310.#.#.a: Bimestral
264.#.1.b: Instituto de Ciencias Aplicadas y Tecnología, UNAM
doi: https://doi.org/10.22201/icat.16656423.2011.9.03.427
harvesting_date: 2023-11-08 13:10:00.0
856.#.0.q: application/pdf
last_modified: 2024-03-19 14:00:00
license_url: https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.es
license_type: by-nc-sa
_deleted_conflicts: 2-056689eadfbf4471dc41e628df655591
No entro en nada
No entro en nada 2