dor_id: 45491

506.#.#.a: Público

590.#.#.d: Los artículos enviados a la revista "Journal of Applied Research and Technology", se juzgan por medio de un proceso de revisión por pares

510.0.#.a: Scopus, Directory of Open Access Journals (DOAJ); Sistema Regional de Información en Línea para Revistas Científicas de América Latina, el Caribe, España y Portugal (Latindex); Indice de Revistas Latinoamericanas en Ciencias (Periódica); La Red de Revistas Científicas de América Latina y el Caribe, España y Portugal (Redalyc); Consejo Nacional de Ciencia y Tecnología (CONACyT); Google Scholar Citation

561.#.#.u: https://www.icat.unam.mx/

650.#.4.x: Ingenierías

336.#.#.b: article

336.#.#.3: Artículo de Investigación

336.#.#.a: Artículo

351.#.#.6: https://jart.icat.unam.mx/index.php/jart

351.#.#.b: Journal of Applied Research and Technology

351.#.#.a: Artículos

harvesting_group: RevistasUNAM

270.1.#.p: Revistas UNAM. Dirección General de Publicaciones y Fomento Editorial, UNAM en revistas@unam.mx

590.#.#.c: Open Journal Systems (OJS)

270.#.#.d: MX

270.1.#.d: México

590.#.#.b: Concentrador

883.#.#.u: https://revistas.unam.mx/catalogo/

883.#.#.a: Revistas UNAM

590.#.#.a: Coordinación de Difusión Cultural

883.#.#.1: https://www.publicaciones.unam.mx/

883.#.#.q: Dirección General de Publicaciones y Fomento Editorial

850.#.#.a: Universidad Nacional Autónoma de México

856.4.0.u: https://jart.icat.unam.mx/index.php/jart/article/view/427/423

100.1.#.a: Martínez Ramos, L.; López García, L.; Rodríguez Henríquez, F.

524.#.#.a: Martínez Ramos, L., et al. (2011). Achieving Identity-Based Cryptography in a Personal Digital Assistant Device. Journal of Applied Research and Technology; Vol. 9 Núm. 03. Recuperado de https://repositorio.unam.mx/contenidos/45491

245.1.0.a: Achieving Identity-Based Cryptography in a Personal Digital Assistant Device

502.#.#.c: Universidad Nacional Autónoma de México

561.1.#.a: Instituto de Ciencias Aplicadas y Tecnología, UNAM

264.#.0.c: 2011

264.#.1.c: 2011-12-01

653.#.#.a: Identity-based identity; bilinear pairings; PGP; mobile devices

506.1.#.a: La titularidad de los derechos patrimoniales de esta obra pertenece a las instituciones editoras. Su uso se rige por una licencia Creative Commons BY-NC-SA 4.0 Internacional, https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.es, para un uso diferente consultar al responsable jurídico del repositorio por medio del correo electrónico gabriel.ascanio@icat.unam.mx

884.#.#.k: https://jart.icat.unam.mx/index.php/jart/article/view/427

001.#.#.#: 074.oai:ojs2.localhost:article/427

041.#.7.h: spa

520.3.#.a: Continuous technological advances have allowed that mobile devices, such as Personal Digital Assistants (PDAs), can executesophisticated applications that more often than not must be equipped with a layer of security that should include theconfidentiality and the authentication services within its repertory. Nevertheless, when compared against front-end computingdevices, most PDAs are still seen as constrained devices with limited processing and storage capabilities.In order to achieve Identity-Based Cryptography (IBC), which was an open problem proposed by Adi Shamir in 1984, Bonehand Franklin presented in Crypto 2001, a solution that uses bilinear pairings as its main building block. Since then, IBC hasbecome an active area of investigation where many efficient IBC security protocols are proposed year after year. In this paper, we present a cryptographic application that allows the secure exchange of documents from a Personal Digital Assistant (PDA) that is wirelessly connected to other nodes. The architecture of our application is inspired by the traditional PGP (Pretty Good Privacy) email security protocol. Our application achieves identity-based authentication and confidentiality functionalities at the 80-bit security level through the usage of a cryptographic library that was coded in C++. Our library can perform basic primitives such as bilinear pairings defined over the binary field and the ternary field , as well as other required primitives known as map-to-point hash functions. We report the timings achieved by our application and we show that they compare well against other similar works published in the open literature.

773.1.#.t: Journal of Applied Research and Technology; Vol. 9 Núm. 03

773.1.#.o: https://jart.icat.unam.mx/index.php/jart

022.#.#.a: ISSN electrónico: 2448-6736; ISSN: 1665-6423

310.#.#.a: Bimestral

264.#.1.b: Instituto de Ciencias Aplicadas y Tecnología, UNAM

doi: https://doi.org/10.22201/icat.16656423.2011.9.03.427

harvesting_date: 2023-11-08 13:10:00.0

856.#.0.q: application/pdf

last_modified: 2024-03-19 14:00:00

license_url: https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.es

license_type: by-nc-sa

_deleted_conflicts: 2-056689eadfbf4471dc41e628df655591

No entro en nada

No entro en nada 2

Artículo

Achieving Identity-Based Cryptography in a Personal Digital Assistant Device

Martínez Ramos, L.; López García, L.; Rodríguez Henríquez, F.

Instituto de Ciencias Aplicadas y Tecnología, UNAM, publicado en Journal of Applied Research and Technology, y cosechado de Revistas UNAM

Licencia de uso

Procedencia del contenido

Cita

Martínez Ramos, L., et al. (2011). Achieving Identity-Based Cryptography in a Personal Digital Assistant Device. Journal of Applied Research and Technology; Vol. 9 Núm. 03. Recuperado de https://repositorio.unam.mx/contenidos/45491

Descripción del recurso

Autor(es)
Martínez Ramos, L.; López García, L.; Rodríguez Henríquez, F.
Tipo
Artículo de Investigación
Área del conocimiento
Ingenierías
Título
Achieving Identity-Based Cryptography in a Personal Digital Assistant Device
Fecha
2011-12-01
Resumen
Continuous technological advances have allowed that mobile devices, such as Personal Digital Assistants (PDAs), can executesophisticated applications that more often than not must be equipped with a layer of security that should include theconfidentiality and the authentication services within its repertory. Nevertheless, when compared against front-end computingdevices, most PDAs are still seen as constrained devices with limited processing and storage capabilities.In order to achieve Identity-Based Cryptography (IBC), which was an open problem proposed by Adi Shamir in 1984, Bonehand Franklin presented in Crypto 2001, a solution that uses bilinear pairings as its main building block. Since then, IBC hasbecome an active area of investigation where many efficient IBC security protocols are proposed year after year. In this paper, we present a cryptographic application that allows the secure exchange of documents from a Personal Digital Assistant (PDA) that is wirelessly connected to other nodes. The architecture of our application is inspired by the traditional PGP (Pretty Good Privacy) email security protocol. Our application achieves identity-based authentication and confidentiality functionalities at the 80-bit security level through the usage of a cryptographic library that was coded in C++. Our library can perform basic primitives such as bilinear pairings defined over the binary field and the ternary field , as well as other required primitives known as map-to-point hash functions. We report the timings achieved by our application and we show that they compare well against other similar works published in the open literature.
Tema
Identity-based identity; bilinear pairings; PGP; mobile devices
Idioma
spa
ISSN
ISSN electrónico: 2448-6736; ISSN: 1665-6423

Enlaces