Abstract
This work includes a review of two cases study of mobile applications that use Identity-Based Cryptography (IBC) to protect communications. It also describes a proposal of a new mobile application that combines the use of IBC for Wi-Fi or Bluetooth communication between smartphones, with the promising Near Field Communication (NFC) technology for secure authentication. The proposed scheme involves NFC pairing to establish as public key a piece of information linked to the device, such as the phone number, so that this information is then used in an IBC scheme for peer-to-peer communication. This is a work in progress, so the implementation of a prototype based on smartphones is still being improved.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anson, A.: Smartphone Usage Statistics (2012), ansonalex.com/infographics/smartphone-usage-statistics-2012-infographic
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Hess, F.: Efficient identity based signature schemes based on pairings. In: ACM SAC (2002)
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005)
NFC forum, http://www.nfc-forum.org
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) Advances in Cryptology - CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004)
Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute based encryption. In: IEEE Symposium on S&P (2007)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS (2006)
Chang, K., Zhang, X., Wang, G., Shin, K.G.: TGIS: Booting Trust for Secure Information Sharing in Dynamic Group Collaborations. In: IEEE PASSAT, pp. 1020–1025 (2011)
Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N., Kapadia, A.: DECENT: A decentralized architecture for enforcing privacy in online social networks. In: IEEE PerCom, pp. 326–332 (2012)
Feldman, A.J., Blankstein, A., Freedman, M.J., Felten, E.W.: Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. USENIX Security, 647–662 (2012)
Rahman, M.S., Huang, T.-K., Madhyastha, H.V., Faloutsos, M.: Efficient and Scalable Software Detection in Online Social Networks. USENIX Security, 663–678 (2012)
Wu, Y., Zhao, Z., Wen, X.: Transparently Secure Smartphone-based Social Networking. In: IEEE WCNC (2013)
Tencent: WeChat, http://www.wechat.com
The Pairing Based Cryptography library, crypto.stanford.edu/pbc
Barnickel, J., Wang, J., Meyer, U.: Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode. In: IEEE TrustCom, pp. 17–24 (2012)
Lu, Y., Vaudenay, S.: Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 483–499. Springer, Heidelberg (2004)
Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Provably secure one-round identity-based authenticated asymmetric group key agreement protocol. Information Sciences 181(19), 4318–4329 (2011)
Guo, H., Li, Z., Mu, Y., Zhang, X.: Provably secure identity based authenticated key agreement protocols with malicious private key generators. Information Sciences 181(3), 628–647 (2011)
NFC Secure Notes, www.windowsphone.com/s?appid=c72e51ce-fdda-452b-84c8-523cc27c76d5
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Mora-Afonso, V., Caballero-Gil, P. (2014). Using Identity-Based Cryptography in Mobile Applications. In: Herrero, Á., et al. International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. Advances in Intelligent Systems and Computing, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-01854-6_54
Download citation
DOI: https://doi.org/10.1007/978-3-319-01854-6_54
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01853-9
Online ISBN: 978-3-319-01854-6
eBook Packages: EngineeringEngineering (R0)