Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/28789
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWinderickx, Jori-
dc.contributor.authorBraeken, An-
dc.contributor.authorSingelee, Dave-
dc.contributor.authorPeeters, Roel-
dc.contributor.authorVANDENRYT, Thijs-
dc.contributor.authorTHOELEN, Ronald-
dc.contributor.authorMENTENS, Nele-
dc.date.accessioned2019-07-23T12:22:27Z-
dc.date.available2019-07-23T12:22:27Z-
dc.date.issued2018-
dc.identifier.citation2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, ASSOC COMPUTING MACHINERY,p. 342-347-
dc.identifier.isbn9781450357616-
dc.identifier.urihttp://hdl.handle.net/1942/28789-
dc.description.abstractThis paper targets the efficient implementation of digital signatures and signcryption schemes on typical internet-of-things (IoT) devices, i.e. embedded processors with constrained computation power and storage. Both signcryption schemes (providing digital signatures and encryption simultaneously) and digital signatures rely on computation-intensive public-key cryptography. When the number of signatures or encrypted messages the device needs to generate after deployment is limited, a trade-off can be made between performing the entire computation on the embedded device or moving part of the computation to a precomputation phase. The latter results in the storage of the precomputed values in the memory of the processor. We examine this trade-off on a health sensor platform and we additionally apply storage encryption, resulting in five implementation variants of the considered schemes.-
dc.description.sponsorshipThis work was funded by the wearlT4health project which is carried out under Interreg V-A Euregio Meuse-Rhine and is supported by the European Union and The European Regional Development Fund and with financial support of the province of Limburg-Belgium.-
dc.language.isoen-
dc.publisherASSOC COMPUTING MACHINERY-
dc.rights2018 ACM.-
dc.subject.otherInternet of Things; Digital signature; Public-key cryptography; Signcryption; Schnorr; Health sensor platform; Storage encryption; Precomputation-
dc.subject.otherInternet of Things; Digital signature; Public-key cryptography; Signcryption; Schnorr; Health sensor platform; Storage encryption; Precomputation-
dc.titleDigital Signatures and Signcryption Schemes on Embedded Devices: a Trade-off between Computation and Storage-
dc.typeProceedings Paper-
local.bibliographicCitation.conferencedateMAY 08-10, 2018-
local.bibliographicCitation.conferencename15th ACM International Conference on Computing Frontiers-
local.bibliographicCitation.conferenceplaceIschia, ITALY-
dc.identifier.epage347-
dc.identifier.spage342-
local.format.pages6-
local.bibliographicCitation.jcatC1-
dc.description.notes[Winderickx, Jori; Singelee, Dave; Peeters, Roel; Mentens, Nele] Katholieke Univ Leuven, IMEC, COSIC, Leuven, Belgium. [Winderickx, Jori; Mentens, Nele] Katholieke Univ Leuven, ES&S, Leuven, Belgium. [Braeken, An] Vrije Univ Brussel, Ind Engn INDI, Brussels, Belgium. [Vandenryt, Thijs; Thoelen, Ronald] Hasselt Univ, IMO, IMOMEC, Hasselt, Belgium.-
local.publisher.placeNEW YORK-
local.type.refereedRefereed-
local.type.specifiedProceedings Paper-
dc.identifier.doi10.1145/3203217.3206426-
dc.identifier.isi000455156500054-
local.bibliographicCitation.btitle2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS-
item.fulltextWith Fulltext-
item.fullcitationWinderickx, Jori; Braeken, An; Singelee, Dave; Peeters, Roel; VANDENRYT, Thijs; THOELEN, Ronald & MENTENS, Nele (2018) Digital Signatures and Signcryption Schemes on Embedded Devices: a Trade-off between Computation and Storage. In: 2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, ASSOC COMPUTING MACHINERY,p. 342-347.-
item.contributorWinderickx, Jori-
item.contributorBraeken, An-
item.contributorSingelee, Dave-
item.contributorPeeters, Roel-
item.contributorVANDENRYT, Thijs-
item.contributorTHOELEN, Ronald-
item.contributorMENTENS, Nele-
item.accessRightsRestricted Access-
item.validationecoom 2020-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
p342-winderickx.pdf
  Restricted Access
Published version305.89 kBAdobe PDFView/Open    Request a copy
embedded_signcryption_vcr_acm.pdf
  Restricted Access
Peer-reviewed author version284 kBAdobe PDFView/Open    Request a copy
Show simple item record

Page view(s)

72
checked on Sep 7, 2022

Download(s)

54
checked on Sep 7, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.