Mapping multiplicity aspects of secure communications into efficient parallel processing

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Certification in public key cryptographic applications concerns the involvement of a CA (Certifying Agent) in approving the validity of users' public keys. Distributed certification pertains to the case where several CAs are involved in issuing certificates. This also includes the case of multiattribute certification, where different CAs approve different user's attributes. In delegated certification, agents transfer certificate issuing authority in hierarchical chain. Efficient certificate verification is of a specific need in ad-hoc networks, as such a verification has to be performed each time new parties have to be engaged in secure communications. Distributed, multi-attribute and delegated certification techniques having a low computational complexity are presented in this paper. It is shown how multiplicity aspects of the various applications are mapped into a multiplied exponents mathematical operation of the form Πmi=1 Aibi mod p. Hardware implementation of this operation boils down to one exponentiator and a multiplexer, with execution time equivalent to one exponentiation.

Original languageEnglish
Title of host publication2008 IEEE International 51st Midwest Symposium on Circuits and Systems, MWSCAS
Pages310-313
Number of pages4
DOIs
StatePublished - 27 Oct 2008
Event2008 IEEE International 51st Midwest Symposium on Circuits and Systems, MWSCAS - Knoxville, TN, United States
Duration: 10 Aug 200813 Aug 2008

Publication series

NameMidwest Symposium on Circuits and Systems
ISSN (Print)1548-3746

Conference

Conference2008 IEEE International 51st Midwest Symposium on Circuits and Systems, MWSCAS
Country/TerritoryUnited States
CityKnoxville, TN
Period10/08/0813/08/08

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Mapping multiplicity aspects of secure communications into efficient parallel processing'. Together they form a unique fingerprint.

Cite this