Skip to main content

Using Identity-Based Cryptography in Mobile Applications

  • Conference paper
International Joint Conference SOCO’13-CISIS’13-ICEUTE’13

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 239))

Abstract

This work includes a review of two cases study of mobile applications that use Identity-Based Cryptography (IBC) to protect communications. It also describes a proposal of a new mobile application that combines the use of IBC for Wi-Fi or Bluetooth communication between smartphones, with the promising Near Field Communication (NFC) technology for secure authentication. The proposed scheme involves NFC pairing to establish as public key a piece of information linked to the device, such as the phone number, so that this information is then used in an IBC scheme for peer-to-peer communication. This is a work in progress, so the implementation of a prototype based on smartphones is still being improved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anson, A.: Smartphone Usage Statistics (2012), ansonalex.com/infographics/smartphone-usage-statistics-2012-infographic

  2. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Hess, F.: Efficient identity based signature schemes based on pairings. In: ACM SAC (2002)

    Google Scholar 

  4. Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. NFC forum, http://www.nfc-forum.org

  6. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) Advances in Cryptology - CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  7. Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute based encryption. In: IEEE Symposium on S&P (2007)

    Google Scholar 

  11. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS (2006)

    Google Scholar 

  12. Chang, K., Zhang, X., Wang, G., Shin, K.G.: TGIS: Booting Trust for Secure Information Sharing in Dynamic Group Collaborations. In: IEEE PASSAT, pp. 1020–1025 (2011)

    Google Scholar 

  13. Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N., Kapadia, A.: DECENT: A decentralized architecture for enforcing privacy in online social networks. In: IEEE PerCom, pp. 326–332 (2012)

    Google Scholar 

  14. Feldman, A.J., Blankstein, A., Freedman, M.J., Felten, E.W.: Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. USENIX Security, 647–662 (2012)

    Google Scholar 

  15. Rahman, M.S., Huang, T.-K., Madhyastha, H.V., Faloutsos, M.: Efficient and Scalable Software Detection in Online Social Networks. USENIX Security, 663–678 (2012)

    Google Scholar 

  16. Wu, Y., Zhao, Z., Wen, X.: Transparently Secure Smartphone-based Social Networking. In: IEEE WCNC (2013)

    Google Scholar 

  17. Tencent: WeChat, http://www.wechat.com

  18. The Pairing Based Cryptography library, crypto.stanford.edu/pbc

  19. Barnickel, J., Wang, J., Meyer, U.: Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode. In: IEEE TrustCom, pp. 17–24 (2012)

    Google Scholar 

  20. Lu, Y., Vaudenay, S.: Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 483–499. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Provably secure one-round identity-based authenticated asymmetric group key agreement protocol. Information Sciences 181(19), 4318–4329 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  22. Guo, H., Li, Z., Mu, Y., Zhang, X.: Provably secure identity based authenticated key agreement protocols with malicious private key generators. Information Sciences 181(3), 628–647 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  23. NFC Secure Notes, www.windowsphone.com/s?appid=c72e51ce-fdda-452b-84c8-523cc27c76d5

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Mora-Afonso .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Mora-Afonso, V., Caballero-Gil, P. (2014). Using Identity-Based Cryptography in Mobile Applications. In: Herrero, Á., et al. International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. Advances in Intelligent Systems and Computing, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-01854-6_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01854-6_54

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01853-9

  • Online ISBN: 978-3-319-01854-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics