TY - GEN
T1 - Mapping multiplicity aspects of secure communications into efficient parallel processing
AU - Arazi, Benjamin
PY - 2008/10/27
Y1 - 2008/10/27
N2 - Certification in public key cryptographic applications concerns the involvement of a CA (Certifying Agent) in approving the validity of users' public keys. Distributed certification pertains to the case where several CAs are involved in issuing certificates. This also includes the case of multiattribute certification, where different CAs approve different user's attributes. In delegated certification, agents transfer certificate issuing authority in hierarchical chain. Efficient certificate verification is of a specific need in ad-hoc networks, as such a verification has to be performed each time new parties have to be engaged in secure communications. Distributed, multi-attribute and delegated certification techniques having a low computational complexity are presented in this paper. It is shown how multiplicity aspects of the various applications are mapped into a multiplied exponents mathematical operation of the form Πmi=1 Aibi mod p. Hardware implementation of this operation boils down to one exponentiator and a multiplexer, with execution time equivalent to one exponentiation.
AB - Certification in public key cryptographic applications concerns the involvement of a CA (Certifying Agent) in approving the validity of users' public keys. Distributed certification pertains to the case where several CAs are involved in issuing certificates. This also includes the case of multiattribute certification, where different CAs approve different user's attributes. In delegated certification, agents transfer certificate issuing authority in hierarchical chain. Efficient certificate verification is of a specific need in ad-hoc networks, as such a verification has to be performed each time new parties have to be engaged in secure communications. Distributed, multi-attribute and delegated certification techniques having a low computational complexity are presented in this paper. It is shown how multiplicity aspects of the various applications are mapped into a multiplied exponents mathematical operation of the form Πmi=1 Aibi mod p. Hardware implementation of this operation boils down to one exponentiator and a multiplexer, with execution time equivalent to one exponentiation.
UR - http://www.scopus.com/inward/record.url?scp=54249165106&partnerID=8YFLogxK
U2 - 10.1109/MWSCAS.2008.4616798
DO - 10.1109/MWSCAS.2008.4616798
M3 - Conference contribution
AN - SCOPUS:54249165106
SN - 9781424421671
T3 - Midwest Symposium on Circuits and Systems
SP - 310
EP - 313
BT - 2008 IEEE International 51st Midwest Symposium on Circuits and Systems, MWSCAS
T2 - 2008 IEEE International 51st Midwest Symposium on Circuits and Systems, MWSCAS
Y2 - 10 August 2008 through 13 August 2008
ER -