As the Internet of Things (IOT) arises, the use of low-end devices on a daily basis increases. The wireless nature of communication that these devices provide raises security and privacy issues. For protecting a user's privacy, cryptography offers the tool of zero knowledge proofs (ZKP). In this paper, we study well-established ZKP protocols based on the discrete logarithm problem and we adapt them to the Elliptic Curve Cryptography (ECC) setting, which consists an ideal candidate for embedded implementations. Then, we implement the proposed protocols on Wiselib, a generic and open source algorithmic library. For the first time, we present a thorough evaluation of the protocols on two popular hardware platforms equipped with low end microcontrollers (Jennic JN5139, TI MSP430) and 802.15.4 RF transceivers, in terms of code size, execution time, message size and energy requirements. This work's results can be used from developers who wish to achieve certain levels of privacy in their applications. © 2011 IEEE.

Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices / Chatzigiannakis, Ioannis; Pyrgelis, A.; Spirakis, P. G.; Stamatiou, Y. C.. - STAMPA. - (2011), pp. 715-720. (Intervento presentato al convegno 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2011 tenutosi a Valencia; Spain) [10.1109/MASS.2011.77].

Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices

CHATZIGIANNAKIS, IOANNIS;
2011

Abstract

As the Internet of Things (IOT) arises, the use of low-end devices on a daily basis increases. The wireless nature of communication that these devices provide raises security and privacy issues. For protecting a user's privacy, cryptography offers the tool of zero knowledge proofs (ZKP). In this paper, we study well-established ZKP protocols based on the discrete logarithm problem and we adapt them to the Elliptic Curve Cryptography (ECC) setting, which consists an ideal candidate for embedded implementations. Then, we implement the proposed protocols on Wiselib, a generic and open source algorithmic library. For the first time, we present a thorough evaluation of the protocols on two popular hardware platforms equipped with low end microcontrollers (Jennic JN5139, TI MSP430) and 802.15.4 RF transceivers, in terms of code size, execution time, message size and energy requirements. This work's results can be used from developers who wish to achieve certain levels of privacy in their applications. © 2011 IEEE.
2011
8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2011
elliptic curve cryptography; privacy; resource constrained devices
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices / Chatzigiannakis, Ioannis; Pyrgelis, A.; Spirakis, P. G.; Stamatiou, Y. C.. - STAMPA. - (2011), pp. 715-720. (Intervento presentato al convegno 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2011 tenutosi a Valencia; Spain) [10.1109/MASS.2011.77].
File allegati a questo prodotto
File Dimensione Formato  
VE_2011_11573-913934.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 205.04 kB
Formato Adobe PDF
205.04 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/913934
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 43
  • ???jsp.display-item.citation.isi??? ND
social impact