An Authenticated Key Scheme over Elliptic Curves for Topological Networks

06/03/2020
by   Riccardo Aragona, et al.
0

Nodes of sensor networks may be resource-constrained devices, often having a limited lifetime, making sensor networks remarkably dynamic environments. Managing a cryptographic protocol on such setups may require a disproportionate effort when it comes to update the secret parameters of new nodes that enter the network in place of dismantled sensors. For this reason, the designers of schemes for sensor network are always concerned with the need of scalable and adaptable solutions. In this work, we present a novel elliptic-curve based solution, derived from the previously released cryptographic protocol TAKS, which addresses this issue. We give a formal description of the scheme, built on a two-dimensional vector space over a prime field and over elliptic curves, where node topology is more relevant than node identity, allowing a dynamic handling of the network and reducing the cost of network updates. We also study some security concerns and their relation to the related discrete logarithm problem over elliptic curves.

READ FULL TEXT
research
06/03/2020

An Authenticated Key Scheme over Elliptic Curves and Security Considerations

Nodes of sensor networks may be resource-constrained devices, often havi...
research
07/09/2018

Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

We describe a framework for constructing an efficient non-interactive ke...
research
07/13/2023

Design and Analysis of Pairing-Friendly Elliptic Curves for Cryptographic Primitives

Elliptic curve cryptography (ECC) is a remarkable mathematical tool that...
research
09/02/2023

Manifesting Unobtainable Secrets: Threshold Elliptic Curve Key Generation using Nested Shamir Secret Sharing

We present a mechanism to manifest unobtainable secrets using a nested S...
research
04/26/2018

Accelerating the Couveignes Rostovtsev Stolbunov key exchange protocol

We study a key exchange protocol based on isogenies between ordinary ell...
research
10/17/2020

A Key-Agreement Protocol Based on Static Parameters and Hash Functions

Wireless Body Sensor Network (WBSN) is a developing technology with cons...
research
03/06/2020

An efficient image encryption scheme based on ordered quasi-resonant Rossby/drift wave triads and Mordell elliptic curves

We propose an image encryption scheme based on quasi-resonant Rossby/dri...

Please sign up or login with your details

Forgot password? Click here to reset