EC(DH)2: an effective secured data storage mechanism for cloud based IoT applications using elliptic curve and Diffie-Hellman

Author(s):  
Balasubramanian Prabhu Kavin ◽  
Sannasi Ganapathy
Cryptography ◽  
2020 ◽  
Vol 4 (3) ◽  
pp. 20 ◽  
Author(s):  
Donghoe Heo ◽  
Suhri Kim ◽  
Kisoon Yoon ◽  
Young-Ho Park ◽  
Seokhie Hong

The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when recovering the coefficient of the image curve for large degree isogenies. Because the Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) requires odd-degree isogenies up to at least 587, this inefficiency is the main bottleneck of using a Montgomery curve for CSIDH. In this paper, we present a new optimization method for faster CSIDH protocols entirely on Montgomery curves. To this end, we present a new parameter for CSIDH, in which the three rational two-torsion points exist. By using the proposed parameters, the CSIDH moves around the surface. The curve coefficient of the image curve can be recovered by a two-torsion point. We also proved that the CSIDH while using the proposed parameter guarantees a free and transitive group action. Additionally, we present the implementation result using our method. We demonstrated that our method is 6.4% faster than the original CSIDH. Our works show that quite higher performance of CSIDH is achieved while only using Montgomery curves.


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


2019 ◽  
Author(s):  
Ramon Cordeiro ◽  
Leonardo Barbosa da Costa ◽  
Antônio Jorge Gomes Abelém

In blockchain, full nodes (FNs) store all existing transactions and are responsible for validating new blocks. The amount of data stored by FNs has been increasing significantly in popular blockchains, such as that of Bitcoin. The excessive amount of data from blockchains increases the storage and processing overhead in FNs, which may cause a reduction in the number of devices that validate and store blockchain data. Also, it may put the decentralization principle of blockchain in risk. This paper proposes a less expensive data storage mechanism for blockchain FNs. The proposed mechanism aims to reduce the storage and processing overhead in FNs, and to guarantee the decentralization characteristic of the network.


Sign in / Sign up

Export Citation Format

Share Document