Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2013

AUTHORS

Youssou Faye , Herve Guyennet , Ibrahima Niang , Yanbo Shou

ABSTRACT

In Wireless Sensor Networks (WSNs), providing a robust security mechanism with limited energy resources is very challenging because of sensor node’s limited resources. Symmetric-key can fulfill the requirement, but if the number of nodes is large, asymmetric-key cryptography is the best natural method because of its scalability. Asymmetric-key cryptography is power-hungry; nevertheless, Elliptic Curve Cryptosystems (ECC) are feasible and more flexible for sensor nodes. Scalar multiplication is the most widely used operation on ECC. Various methods for fast scalar multiplication are based on the binary/ternary representation of the scalar. In this paper, we present a novel technique to make fast scalar multiplication on ECC over prime field for light-weight embedded devices like sensor nodes. Our method significantly reduces the computation of scalar multiplication by an equivalent representation of points based on point order in a given interval. Since our technique can act as a support for most existing methods, after an analytical and efficiency analysis, we implement and evaluate its performance in different scenarios. More... »

PAGES

171-182

References to SciGraph publications

Book

TITLE

Cyberspace Safety and Security

ISBN

978-3-319-03583-3
978-3-319-03584-0

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-03584-0_13

DOI

http://dx.doi.org/10.1007/978-3-319-03584-0_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1028830338


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "name": [
            "Femto-st DISC, Franche-Comte University, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Faye", 
        "givenName": "Youssou", 
        "id": "sg:person.011634302337.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011634302337.28"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Femto-st DISC, Franche-Comte University, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Guyennet", 
        "givenName": "Herve", 
        "id": "sg:person.015343114273.20", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015343114273.20"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Department of Mathematics and Computer Sciences, UCAD University, Senegal"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Niang", 
        "givenName": "Ibrahima", 
        "id": "sg:person.016215145337.04", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016215145337.04"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Femto-st DISC, Franche-Comte University, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Shou", 
        "givenName": "Yanbo", 
        "id": "sg:person.014736132647.55", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014736132647.55"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/0-387-23483-7_131", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1021349612", 
          "https://doi.org/10.1007/0-387-23483-7_131"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10623-005-3299-y", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030333634", 
          "https://doi.org/10.1007/s10623-005-3299-y"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10623-005-3299-y", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030333634", 
          "https://doi.org/10.1007/s10623-005-3299-y"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11593447_4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033469185", 
          "https://doi.org/10.1007/11593447_4"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11593447_4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033469185", 
          "https://doi.org/10.1007/11593447_4"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-04138-9_22", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1037705065", 
          "https://doi.org/10.1007/978-3-642-04138-9_22"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-35668-1_21", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1046585519", 
          "https://doi.org/10.1007/978-3-642-35668-1_21"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1006/jagm.1997.0913", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047704368"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tc.2007.70815", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061534522"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1090/conm/461/08979", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1089198565"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icpads.2009.9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093467819"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icccas.2005.1493364", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093669753"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/nswctc.2010.30", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095508640"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2013", 
    "datePublishedReg": "2013-01-01", 
    "description": "In Wireless Sensor Networks (WSNs), providing a robust security mechanism with limited energy resources is very challenging because of sensor node\u2019s limited resources. Symmetric-key can fulfill the requirement, but if the number of nodes is large, asymmetric-key cryptography is the best natural method because of its scalability. Asymmetric-key cryptography is power-hungry; nevertheless, Elliptic Curve Cryptosystems (ECC) are feasible and more flexible for sensor nodes. Scalar multiplication is the most widely used operation on ECC. Various methods for fast scalar multiplication are based on the binary/ternary representation of the scalar. In this paper, we present a novel technique to make fast scalar multiplication on ECC over prime field for light-weight embedded devices like sensor nodes. Our method significantly reduces the computation of scalar multiplication by an equivalent representation of points based on point order in a given interval. Since our technique can act as a support for most existing methods, after an analytical and efficiency analysis, we implement and evaluate its performance in different scenarios.", 
    "editor": [
      {
        "familyName": "Wang", 
        "givenName": "Guojun", 
        "type": "Person"
      }, 
      {
        "familyName": "Ray", 
        "givenName": "Indrakshi", 
        "type": "Person"
      }, 
      {
        "familyName": "Feng", 
        "givenName": "Dengguo", 
        "type": "Person"
      }, 
      {
        "familyName": "Rajarajan", 
        "givenName": "Muttukrishnan", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-03584-0_13", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-03583-3", 
        "978-3-319-03584-0"
      ], 
      "name": "Cyberspace Safety and Security", 
      "type": "Book"
    }, 
    "name": "Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks", 
    "pagination": "171-182", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-03584-0_13"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "8957527ee54c5e58c91ec0f23e24107ecd84938f8bf51802914b516d0a220a12"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1028830338"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-03584-0_13", 
      "https://app.dimensions.ai/details/publication/pub.1028830338"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T22:56", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8695_00000261.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-03584-0_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-03584-0_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-03584-0_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-03584-0_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-03584-0_13'


 

This table displays all metadata directly associated to this object as RDF triples.

144 TRIPLES      23 PREDICATES      38 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-03584-0_13 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nc46c8f5984a14855997914df2bf083de
4 schema:citation sg:pub.10.1007/0-387-23483-7_131
5 sg:pub.10.1007/11593447_4
6 sg:pub.10.1007/978-3-642-04138-9_22
7 sg:pub.10.1007/978-3-642-35668-1_21
8 sg:pub.10.1007/s10623-005-3299-y
9 https://doi.org/10.1006/jagm.1997.0913
10 https://doi.org/10.1090/conm/461/08979
11 https://doi.org/10.1109/icccas.2005.1493364
12 https://doi.org/10.1109/icpads.2009.9
13 https://doi.org/10.1109/nswctc.2010.30
14 https://doi.org/10.1109/tc.2007.70815
15 schema:datePublished 2013
16 schema:datePublishedReg 2013-01-01
17 schema:description In Wireless Sensor Networks (WSNs), providing a robust security mechanism with limited energy resources is very challenging because of sensor node’s limited resources. Symmetric-key can fulfill the requirement, but if the number of nodes is large, asymmetric-key cryptography is the best natural method because of its scalability. Asymmetric-key cryptography is power-hungry; nevertheless, Elliptic Curve Cryptosystems (ECC) are feasible and more flexible for sensor nodes. Scalar multiplication is the most widely used operation on ECC. Various methods for fast scalar multiplication are based on the binary/ternary representation of the scalar. In this paper, we present a novel technique to make fast scalar multiplication on ECC over prime field for light-weight embedded devices like sensor nodes. Our method significantly reduces the computation of scalar multiplication by an equivalent representation of points based on point order in a given interval. Since our technique can act as a support for most existing methods, after an analytical and efficiency analysis, we implement and evaluate its performance in different scenarios.
18 schema:editor Ne6385e5225b647baaa812205375491d8
19 schema:genre chapter
20 schema:inLanguage en
21 schema:isAccessibleForFree false
22 schema:isPartOf Nf29b19fd22834fc19f8b8d30c98cf659
23 schema:name Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks
24 schema:pagination 171-182
25 schema:productId N45097df338eb454ca7e1d5a9c69d925c
26 Neaeb3c9b74eb42b4878c11613f6cfbc0
27 Nf91cb69096564825a00d1dfa52966ab1
28 schema:publisher N607f97764ffa44eeb6415fafdb8bc1f6
29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028830338
30 https://doi.org/10.1007/978-3-319-03584-0_13
31 schema:sdDatePublished 2019-04-15T22:56
32 schema:sdLicense https://scigraph.springernature.com/explorer/license/
33 schema:sdPublisher N5e86b467d5f14058a762513e7377ea2d
34 schema:url http://link.springer.com/10.1007/978-3-319-03584-0_13
35 sgo:license sg:explorer/license/
36 sgo:sdDataset chapters
37 rdf:type schema:Chapter
38 N07cd61932f9a416a968eb616ca8d4a4e schema:familyName Ray
39 schema:givenName Indrakshi
40 rdf:type schema:Person
41 N28eadf6ea94f419aad4083f5ea8e0723 schema:familyName Wang
42 schema:givenName Guojun
43 rdf:type schema:Person
44 N2a2a8460d542422ca79bd97157761c47 schema:name Department of Mathematics and Computer Sciences, UCAD University, Senegal
45 rdf:type schema:Organization
46 N30d3cc42b48f4f9c896656b742a05dea schema:name Femto-st DISC, Franche-Comte University, France
47 rdf:type schema:Organization
48 N45097df338eb454ca7e1d5a9c69d925c schema:name readcube_id
49 schema:value 8957527ee54c5e58c91ec0f23e24107ecd84938f8bf51802914b516d0a220a12
50 rdf:type schema:PropertyValue
51 N5e86b467d5f14058a762513e7377ea2d schema:name Springer Nature - SN SciGraph project
52 rdf:type schema:Organization
53 N607f97764ffa44eeb6415fafdb8bc1f6 schema:location Cham
54 schema:name Springer International Publishing
55 rdf:type schema:Organisation
56 N9d954516a16c461f873577e5d3d04380 schema:name Femto-st DISC, Franche-Comte University, France
57 rdf:type schema:Organization
58 N9ec0baf97fe8427aa7db1dc944f17503 schema:name Femto-st DISC, Franche-Comte University, France
59 rdf:type schema:Organization
60 Na5ab201d77fb428e802f8cba4d93c201 schema:familyName Feng
61 schema:givenName Dengguo
62 rdf:type schema:Person
63 Nad63f4126f2c4ce292ba2611f9dedb91 rdf:first sg:person.014736132647.55
64 rdf:rest rdf:nil
65 Nc46c8f5984a14855997914df2bf083de rdf:first sg:person.011634302337.28
66 rdf:rest Ne605780e16d3428dba6a76361645bfc8
67 Nc84a44bf1933461f8d03f85773f059be rdf:first Nf89533fa7cff4469906b51f2c6bc1824
68 rdf:rest rdf:nil
69 Ne605780e16d3428dba6a76361645bfc8 rdf:first sg:person.015343114273.20
70 rdf:rest Nfba62f7a4df147a0a6b31cdf9197775c
71 Ne6385e5225b647baaa812205375491d8 rdf:first N28eadf6ea94f419aad4083f5ea8e0723
72 rdf:rest Nfcd735a473db4c4a8c155cadcee8072c
73 Neaeb3c9b74eb42b4878c11613f6cfbc0 schema:name dimensions_id
74 schema:value pub.1028830338
75 rdf:type schema:PropertyValue
76 Nef32e4178ad74d8dba337024dc160581 rdf:first Na5ab201d77fb428e802f8cba4d93c201
77 rdf:rest Nc84a44bf1933461f8d03f85773f059be
78 Nf29b19fd22834fc19f8b8d30c98cf659 schema:isbn 978-3-319-03583-3
79 978-3-319-03584-0
80 schema:name Cyberspace Safety and Security
81 rdf:type schema:Book
82 Nf89533fa7cff4469906b51f2c6bc1824 schema:familyName Rajarajan
83 schema:givenName Muttukrishnan
84 rdf:type schema:Person
85 Nf91cb69096564825a00d1dfa52966ab1 schema:name doi
86 schema:value 10.1007/978-3-319-03584-0_13
87 rdf:type schema:PropertyValue
88 Nfba62f7a4df147a0a6b31cdf9197775c rdf:first sg:person.016215145337.04
89 rdf:rest Nad63f4126f2c4ce292ba2611f9dedb91
90 Nfcd735a473db4c4a8c155cadcee8072c rdf:first N07cd61932f9a416a968eb616ca8d4a4e
91 rdf:rest Nef32e4178ad74d8dba337024dc160581
92 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
93 schema:name Information and Computing Sciences
94 rdf:type schema:DefinedTerm
95 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
96 schema:name Data Format
97 rdf:type schema:DefinedTerm
98 sg:person.011634302337.28 schema:affiliation N9d954516a16c461f873577e5d3d04380
99 schema:familyName Faye
100 schema:givenName Youssou
101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011634302337.28
102 rdf:type schema:Person
103 sg:person.014736132647.55 schema:affiliation N9ec0baf97fe8427aa7db1dc944f17503
104 schema:familyName Shou
105 schema:givenName Yanbo
106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014736132647.55
107 rdf:type schema:Person
108 sg:person.015343114273.20 schema:affiliation N30d3cc42b48f4f9c896656b742a05dea
109 schema:familyName Guyennet
110 schema:givenName Herve
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015343114273.20
112 rdf:type schema:Person
113 sg:person.016215145337.04 schema:affiliation N2a2a8460d542422ca79bd97157761c47
114 schema:familyName Niang
115 schema:givenName Ibrahima
116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016215145337.04
117 rdf:type schema:Person
118 sg:pub.10.1007/0-387-23483-7_131 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021349612
119 https://doi.org/10.1007/0-387-23483-7_131
120 rdf:type schema:CreativeWork
121 sg:pub.10.1007/11593447_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033469185
122 https://doi.org/10.1007/11593447_4
123 rdf:type schema:CreativeWork
124 sg:pub.10.1007/978-3-642-04138-9_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037705065
125 https://doi.org/10.1007/978-3-642-04138-9_22
126 rdf:type schema:CreativeWork
127 sg:pub.10.1007/978-3-642-35668-1_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046585519
128 https://doi.org/10.1007/978-3-642-35668-1_21
129 rdf:type schema:CreativeWork
130 sg:pub.10.1007/s10623-005-3299-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1030333634
131 https://doi.org/10.1007/s10623-005-3299-y
132 rdf:type schema:CreativeWork
133 https://doi.org/10.1006/jagm.1997.0913 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047704368
134 rdf:type schema:CreativeWork
135 https://doi.org/10.1090/conm/461/08979 schema:sameAs https://app.dimensions.ai/details/publication/pub.1089198565
136 rdf:type schema:CreativeWork
137 https://doi.org/10.1109/icccas.2005.1493364 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093669753
138 rdf:type schema:CreativeWork
139 https://doi.org/10.1109/icpads.2009.9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093467819
140 rdf:type schema:CreativeWork
141 https://doi.org/10.1109/nswctc.2010.30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095508640
142 rdf:type schema:CreativeWork
143 https://doi.org/10.1109/tc.2007.70815 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061534522
144 rdf:type schema:CreativeWork
 




Preview window. Press ESC to close (or click here)


...