{"title":"ad hoc网络安全配对分析模型","authors":"A. Sethi, S. Vijay, J. Saini","doi":"10.1109/CCCS.2018.8586830","DOIUrl":null,"url":null,"abstract":"Key pairing and enciphering heuristics must be free from complexity whereas amount of confidentiality directs the adaptability of encryption and decryption scheme because an extensive ciphertext requires extra space complexity and more communication time. Fast and secure authenticators are present in the literature. As compared to RSA, an elliptic curve in secure paring using smallest size of key is more efficient without sub-exponential attack on the Discrete Logarithmic problem. This paper focuses on analytical representation of different elliptic curves used in pairing of devices in ad-hoc network. BN, BLS and KSS curves are mostly used in the Elliptic cryptography systems. Assortment of an appropriate Hash function in elliptic curve and constraints for pairing has great impact on security level and complexity. Analytically proved the performance of BLS curve with different embedding degree in terms of computation time is fair enough.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"34 1","pages":"225-229"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Analytical Model for Secure Pairing in ad hoc Network\",\"authors\":\"A. Sethi, S. Vijay, J. Saini\",\"doi\":\"10.1109/CCCS.2018.8586830\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Key pairing and enciphering heuristics must be free from complexity whereas amount of confidentiality directs the adaptability of encryption and decryption scheme because an extensive ciphertext requires extra space complexity and more communication time. Fast and secure authenticators are present in the literature. As compared to RSA, an elliptic curve in secure paring using smallest size of key is more efficient without sub-exponential attack on the Discrete Logarithmic problem. This paper focuses on analytical representation of different elliptic curves used in pairing of devices in ad-hoc network. BN, BLS and KSS curves are mostly used in the Elliptic cryptography systems. Assortment of an appropriate Hash function in elliptic curve and constraints for pairing has great impact on security level and complexity. Analytically proved the performance of BLS curve with different embedding degree in terms of computation time is fair enough.\",\"PeriodicalId\":6570,\"journal\":{\"name\":\"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)\",\"volume\":\"34 1\",\"pages\":\"225-229\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCCS.2018.8586830\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCCS.2018.8586830","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analytical Model for Secure Pairing in ad hoc Network
Key pairing and enciphering heuristics must be free from complexity whereas amount of confidentiality directs the adaptability of encryption and decryption scheme because an extensive ciphertext requires extra space complexity and more communication time. Fast and secure authenticators are present in the literature. As compared to RSA, an elliptic curve in secure paring using smallest size of key is more efficient without sub-exponential attack on the Discrete Logarithmic problem. This paper focuses on analytical representation of different elliptic curves used in pairing of devices in ad-hoc network. BN, BLS and KSS curves are mostly used in the Elliptic cryptography systems. Assortment of an appropriate Hash function in elliptic curve and constraints for pairing has great impact on security level and complexity. Analytically proved the performance of BLS curve with different embedding degree in terms of computation time is fair enough.