Filters








29,349 Hits in 7.2 sec

SEAL-Embedded: A Homomorphic Encryption Library for the Internet of Things

Deepika Natarajan, Wei Dai
2021 Transactions on Cryptographic Hardware and Embedded Systems  
SEAL-Embedded employs several computational and algorithmic optimizations along with a detailed memory re-use scheme to achieve memory efficient, high performance CKKS encoding and encryption on embedded  ...  limited its use on resource-constrained embedded devices.  ...  problem is to encrypt data on the device using a public key instead of a secret key, thereby removing the need for the secret key to be stored on the device entirely.  ... 
doi:10.46586/tches.v2021.i3.756-779 fatcat:zrm2lpyqkfeizky2nkgpp3tywa

Small Private Key MQPKS on an Embedded Microprocessor

Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim
2014 Sensors  
As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported  ...  Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system  ...  Author Contributions Jihyun Kim and Jongseok Choi contributed to algorithm analysis. Taehwan Park and Zhe Liu contributed to implementation of the cryptography.  ... 
doi:10.3390/s140305441 pmid:24651722 pmcid:PMC4004000 fatcat:6b4er33s2fay5orqcguy5zius4

Secure and Efficient Authentication Scheme in IoT Environments

Abhijeet Thakare, Young-Gab Kim
2021 Applied Sciences  
However, the schemes proposed in the literature are lacking in the creation of a lightweight (i.e., low computing, communication, and storage cost) and secure architecture.  ...  Furthermore, the existing approaches lead to an increase in the burden on storage memory and also create heavy traffic on a communication channel, increasing the response time of device authentication  ...  Notation Description P SWi Secret password of the embedded device P ke Public key of the embedded device P ks Public key of the server I i Hashed embedded device ID CID i Server-generated embedded device  ... 
doi:10.3390/app11031260 fatcat:ji2hav34irfj5eqyj3kwrqgdna

Special issue on security and privacy techniques in mobile cloud computing

Ilsun You, Jin Li
2016 Journal of Ambient Intelligence and Humanized Computing  
Alice and the proxy cannot extract secret key of Bob.  ...  Especially, it focuses on both the theoretical and the practical aspects of the security issues in mobile cloud computing.  ...  Moreover, the authors proposed a public key encryption scheme to secure against affine related-key attacks based on the lattice.  ... 
doi:10.1007/s12652-016-0390-3 fatcat:hiknxbyj5rcjvaxnulkzyj4z7e

A Novel Constant size Cipher-text Scheme for Security in Real-time Systems

M. Dhivya, S. Venkatraman, Tina Belinda Miranda
2015 International Journal of Computer Applications Technology and Research  
However, current 'secure attribute based system with short ciphertext' schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy  ...  We propose a novel 'secure attribute based system with short ciphertext' scheme with constantsize decryption keys independent of the number of attributes.  ...  key storage in lightweight devices  ... 
doi:10.7753/ijcatr0405.1002 fatcat:ue6ixv7kuvhxnhfqij6zi7aywy

Energy-Aware Digital Signatures for Embedded Medical Devices [article]

Muslum Ozgur Ozmen, Attila A. Yavuz, Rouzbeh Behnia
2019 arXiv   pre-print
Hence, ESEM can be suitable for deployment on resource limited embedded devices in IoT. We open-sourced our software for public testing and wide-adoption.  ...  We propose an Energy-aware Signature for Embedded Medical devices (ESEM) that achieves near-optimal signer efficiency.  ...  RELATED WORK There are two main lines of work to offer authentication for embedded medical devices: symmetric key primitives (e.g., MACs) and public key primitives (e.g., digital signatures).  ... 
arXiv:1903.07786v1 fatcat:va5utsmumbcrpfvndzjmtu72c4

NVM Storage in IoT Devices: Opportunities and Challenges

Yang Liu, Shan Zhao, Wenhan Chen, Xuran Ge, Fang Liu, Shuo Li, Nong Xiao
2021 Computer systems science and engineering  
Finally, we present the opportunities and challenges of building IoT storage systems based on NVM.  ...  Moreover, the existing solutions to reduce the write latency and energy consumption and increase the lifetime of NVM IoT storage devices are analyzed.  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/csse.2021.017224 fatcat:uu4bprtlnfglrlpafsnjjlvqfq

Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices [chapter]

Florian Kohnhäuser, Stefan Katzenbeisser
2016 Lecture Notes in Computer Science  
This work presents a novel code update scheme which verifies and enforces the correct installation of code updates on all devices in the network.  ...  This, in particular, allows us to provide secure code updates for groups of devices. Our scheme allows only fresh and authenticated updates to be installed on devices.  ...  In the offline phase, O thus generates a unique identifier i and a unique signature key pair, consisting of a public key PK i and a private key SK i , for each device D i .  ... 
doi:10.1007/978-3-319-45741-3_17 fatcat:4blcbnzm6ncbva5c5ft6ux5t6u

Storage-Optimal Key Sharing with Authentication in Sensor Networks [chapter]

Jian Wang, Z. Y. Xia, Lein Harn, Guihai Chen
2005 Lecture Notes in Computer Science  
Then, a storage-optimal key sharing scheme with authentication is proposed in this paper.  ...  This scheme requires each sensor node to hold one secret key and hash functions only, and is optimal in terms of memory consumption which is more rigorous constraint factor than computation and communication  ...  Propose a novel storage-optimal authenticated key sharing scheme.  ... 
doi:10.1007/11576259_51 fatcat:myqiccwdgncf3nvpgoeysfrh2m

Storage-optimal key sharing with authentication in sensor networks

Jian Wang, Zyxia, L. Harn
2005 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems  
Then, a storage-optimal key sharing scheme with authentication is proposed in this paper.  ...  This scheme requires each sensor node to hold one secret key and hash functions only, and is optimal in terms of memory consumption which is more rigorous constraint factor than computation and communication  ...  Propose a novel storage-optimal authenticated key sharing scheme.  ... 
doi:10.1109/mtas.2005.243759 fatcat:dz7l2johsfeqpl53axiax5w5aq

MicroEliece: McEliece for Embedded Devices [chapter]

Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, Christof Paar
2009 Lecture Notes in Computer Science  
In this work, we investigate the efficient implementation of the McEliece scheme on embedded systems what was -up to date -considered a challenge due to the required storage of its large keys.  ...  Most advanced security systems rely on public-key schemes based either on the factorization or the discrete logarithm problem.  ...  Thus, we believe with growing memories in embedded systems, ongoing research and further optimizations, McEliece can evolve to a suitable and quantum computer-resistant alternative to RSA and ECC that  ... 
doi:10.1007/978-3-642-04138-9_4 fatcat:kwhtv6gtsvf53iglatiohdiad4

Secured and Memory Concerned Data Handling Management in Cloud Environment: A Survey

D. Pradeepa, Dr. P. Sumathi
2017 International Journal of Engineering Research and  
The wide attacking surface of the public cloud and the growing security awareness from the society are both calling for data encryption before outsourcing to cloud.  ...  Data de-duplication has been widely used in backups to save storage space and network bandwidth.  ...  Its design consists of embedding a partial convergent encryption along with a unique signature generation scheme into a H.264 video compression scheme 4.  ... 
doi:10.17577/ijertv6is090061 fatcat:naadf3q45betldrm2jts5y55qq

Lightweight Cryptography for Embedded Systems – A Comparative Analysis [chapter]

Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Konstantinos Rantos
2014 Lecture Notes in Computer Science  
As computing becomes pervasive, embedded systems are deployed in a wide range of domains, including industrial systems, critical infrastructures, private and public spaces as well as portable and wearable  ...  A classification and evaluation of the schemes is also provided, utilizing relevant metrics in order to assess their suitability for various types of embedded systems.  ...  Key sizes impact on the computations that are performed, the speed, the key storage and the output's size.  ... 
doi:10.1007/978-3-642-54568-9_21 fatcat:parncxw2ynhfzpxnx22iwo52ga

2021 Index IEEE Transactions on Cloud Computing Vol. 9

2022 IEEE Transactions on Cloud Computing  
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author's name, the publication abbreviation, month, and year, and inclusive pages.  ...  -Dec. 2021 1645-1656 Streaming Cloud Platform for Real-Time Video Processing on Embedded Devices.  ... 
doi:10.1109/tcc.2022.3163598 fatcat:mnahwnctzva4lmjw64vjkhwbka

A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment

Vivek Katiyar, Kamlesh Dutta, Syona Gupta
2010 International Journal of Computer Applications  
Most of the devices used in wireless/mobile environments, that form wireless networks, ad-hoc networks and wireless sensor networks etc., have low computational power, memory and limited battery power.  ...  This paper provides an introduction to ECC and presents a survey on the current use of ECC in the pervasive computing environment. General Terms Security in pervasive environment.  ...  INTRODUCTION The idea that technology is moving beyond the personal computer to everyday devices with embedded technology and connectivity, as computing devices become progressively smaller and more powerful  ... 
doi:10.5120/1615-2171 fatcat:abvbo2q355govge5ofaslevzq4
« Previous Showing results 1 — 15 out of 29,349 results