<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232011000300005</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Achieving Identity-Based Cryptography in a Personal Digital Assistant Device]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Martínez-Ramos]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[López-García]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez-Henríquez]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Instituto Politécnico Nacional Centro de Investigación y de Estudios Avanzados ]]></institution>
<addr-line><![CDATA[México D.F]]></addr-line>
</aff>
<aff id="A02">
<institution><![CDATA[,Universidad Autónoma del Estado de México Centro Universitario Zumpango ]]></institution>
<addr-line><![CDATA[México ]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2011</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2011</year>
</pub-date>
<volume>9</volume>
<numero>3</numero>
<fpage>324</fpage>
<lpage>334</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232011000300005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232011000300005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232011000300005&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Continuous technological advances have allowed that mobile devices, such as Personal Digital Assistants (PDAs), can execute sophisticated applications that more often than not must be equipped with a layer of security that should include the confidentiality and the authentication services within its repertory. Nevertheless, when compared against front-end computing devices, most PDAs are still seen as constrained devices with limited processing and storage capabilities. In order to achieve Identity-Based Cryptography (IBC), which was an open problem proposed by Adi Shamir in 1984, Boneh and Franklin presented in Crypto 2001, a solution that uses bilinear pairings as its main building block. Since then, IBC has become an active area of investigation where many efficient IBC security protocols are proposed year after year. In this paper, we present a cryptographic application that allows the secure exchange of documents from a Personal Digital Assistant (PDA) that is wirelessly connected to other nodes. The architecture of our application is inspired by the traditional PGP (Pretty Good Privacy) email security protocol. Our application achieves identity-based authentication and confidentiality functionalities at the 80-bit security level through the usage of a cryptographic library that was coded in C++. Our library can perform basic primitives such as bilinear pairings defined over the binary field F2233 and the ternary field F397, as well as other required primitives known as map-to-point hash functions. We report the timings achieved by our application and we show that they compare well against other similar works published in the open literature.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Los incesantes avances tecnológicos han permitido que los dispositivos móviles, tales como los Asistentes Digitales Personales (PDAs), puedan ejecutar aplicaciones sofisticadas que usualmente no realizaban, para lo cual deben estar equipadas con una capa de seguridad que debe incluir en su repertorio los servicios de confidencialidad y autenticación. Sin embargo, este tipo dispositivos comparados con servidores, aún exhiben limitaciones en procesamiento y almacenamiento. Con la finalidad de hacer realidad la criptografía basada en la identidad (IBC por sus siglas en inglés), la cual fue considerada un problema abierto propuesto por Adi Shamir en 1984, Boneh y Franklin presentaron en Crypto 2001, una solución que usa emparejamientos bilineales como su bloque principal. Desde entonces, IBC ha sido un área activa de investigación en la cual muchos protocolos eficientes de seguridad son propuestos año tras año. En este artículo, presentamos una aplicación criptográfica que permite el intercambio seguro de documentos de un Asistente Digital Personal (PDA), el cual es conectado de forma inalámbrica con otros dispositivos. La arquitectura de nuestra aplicación está inspirada en el tradicional protocolo de seguridad de correo electrónico PGP (Pretty Good Privacy). Nuestra aplicación alcanza las funcionalidades de autenticación y cifrado, ambos basados en la identidad con un nivel de seguridad de 80 bits, a través del uso de una biblioteca criptográfica que fue codificada en C++. Nuestra biblioteca implementa primitivas básicas tales como emparejamientos bilineales definidos sobre los campos binarios F2233 y el ternario F397, así como otras primitivas requeridas, conocidas como funciones picadillo map-to-point. Presentamos también los reportes de los tiempos obtenidos por nuestra aplicación y mostramos una comparación de los mismos contra otros resultados publicados en la literatura abierta.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Identity-based identity]]></kwd>
<kwd lng="en"><![CDATA[bilinear pairings]]></kwd>
<kwd lng="en"><![CDATA[PGP]]></kwd>
<kwd lng="en"><![CDATA[mobile devices]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="center"><font face="verdana" size="4"><b>Achieving Identity&#150;Based Cryptography in a Personal Digital Assistant Device</b></font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="2"><b>L. Mart&iacute;nez&#150;Ramos*<sup>1</sup>, L. L&oacute;pez&#150;Garc&iacute;a<sup>2</sup>, F. Rodr&iacute;guez&#150;Henr&iacute;quez<sup>3</sup></b></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><i><sup>1,2,3</sup> Computer Department, CINVESTAV&#150;IPN San Pedro Zacatenco, M&eacute;xico, D.F</i></font></p>         <p align="justify"><font face="verdana" size="2"><i><sup>2</sup> Centro Universitario Zumpango Universidad Aut&oacute;noma del Estado de M&eacute;xico Camino viejo a Jilotzingo continuaci&oacute;n calle Ray&oacute;n Valle Hermoso, Zumpango, M&eacute;xico, C.P. 55600 *E&#150;mail:</i> <a href="mailto:mlopez@computacion.cs.cinvestav.mx">mlopez@computacion.cs.cinvestav.mx</a></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>ABSTRACT</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Continuous technological advances have allowed that mobile devices, such as Personal Digital Assistants (PDAs), can execute sophisticated applications that more often than not must be equipped with a layer of security that should include the confidentiality and the authentication services within its repertory. Nevertheless, when compared against front&#150;end computing devices, most PDAs are still seen as constrained devices with limited processing and storage capabilities.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">In order to achieve Identity&#150;Based Cryptography (IBC), which was an open problem proposed by Adi Shamir in 1984, Boneh and Franklin presented in Crypto 2001, a solution that uses bilinear pairings as its main building block. Since then, IBC has become an active area of investigation where many efficient IBC security protocols are proposed year after year. In this paper, we present a cryptographic application that allows the secure exchange of documents from a Personal Digital Assistant (PDA) that is wirelessly connected to other nodes. The architecture of our application is inspired by the traditional PGP (Pretty Good Privacy) email security protocol. Our application achieves identity&#150;based authentication and confidentiality functionalities at the 80&#150;bit security level through the usage of a cryptographic library that was coded in C++. Our library can perform basic primitives such as bilinear pairings defined over the binary field <b>F</b><sub>2233</sub> and the ternary field <b>F</b><sub>397</sub>, as well as other required primitives known as <i>map&#150;to&#150;point</i> hash functions. We report the timings achieved by our application and we show that they compare well against other similar works published in the open literature.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Identity&#150;based identity, bilinear pairings, PGP, mobile devices.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>RESUMEN</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Los incesantes avances tecnol&oacute;gicos han permitido que los dispositivos m&oacute;viles, tales como los Asistentes Digitales Personales (PDAs), puedan ejecutar aplicaciones sofisticadas que usualmente no realizaban, para lo cual deben estar equipadas con una capa de seguridad que debe incluir en su repertorio los servicios de confidencialidad y autenticaci&oacute;n. Sin embargo, este tipo dispositivos comparados con servidores, a&uacute;n exhiben limitaciones en procesamiento y almacenamiento.</font></p>  	    <p align="justify"><font face="verdana" size="2">Con la finalidad de hacer realidad la criptograf&iacute;a basada en la identidad (<i>IBC</i> por sus siglas en ingl&eacute;s), la cual fue considerada un problema abierto propuesto por Adi Shamir en 1984, Boneh y Franklin presentaron en Crypto 2001, una soluci&oacute;n que usa emparejamientos bilineales como su bloque principal. Desde entonces, IBC ha sido un &aacute;rea activa de investigaci&oacute;n en la cual muchos protocolos eficientes de seguridad son propuestos a&ntilde;o tras a&ntilde;o. En este art&iacute;culo, presentamos una aplicaci&oacute;n criptogr&aacute;fica que permite el intercambio seguro de documentos de un Asistente Digital Personal (PDA), el cual es conectado de forma inal&aacute;mbrica con otros dispositivos. La arquitectura de nuestra aplicaci&oacute;n est&aacute; inspirada en el tradicional protocolo de seguridad de correo electr&oacute;nico PGP (Pretty Good Privacy). Nuestra aplicaci&oacute;n alcanza las funcionalidades de autenticaci&oacute;n y cifrado, ambos basados en la identidad con un nivel de seguridad de 80 bits, a trav&eacute;s del uso de una biblioteca criptogr&aacute;fica que fue codificada en C++. Nuestra biblioteca implementa primitivas b&aacute;sicas tales como emparejamientos bilineales definidos sobre los campos binarios <b>F</b><sub>2233</sub> y el ternario <b>F</b><sub>397</sub>, as&iacute; como otras primitivas requeridas, conocidas como funciones picadillo <i>map&#150;to&#150;point.</i> Presentamos tambi&eacute;n los reportes de los tiempos obtenidos por nuestra aplicaci&oacute;n y mostramos una comparaci&oacute;n de los mismos contra otros resultados publicados en la literatura abierta.</font></p>      <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/jart/v9n3/v9n3a5.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b><i>References</i></b></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; Boneh D. and Franklin M. K., Identity&#150;Based Encryption from the Weil Pairing, Proceedings of CRYPTO '01, the 21st Annual International Cryptology Conference on Advances in Cryptology, 2001, pp. 213-229, Springer&#150;Verlag, London, UK.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827581&pid=S1665-6423201100030000500001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; Beuchat J&#150;L., Brisebarre N., Detrey J., Okamoto E., Shirase M., and Takagi T., Algorithms and Arithmetic Operators for Computing the T Pairing in Characteristic Three, IEEE Trans. Comput., Vol. 57, Issue. 11. 2008, pp. 1454&#150;1468, IEEE Computer Society, Washington, DC, USA.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827583&pid=S1665-6423201100030000500002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; Shamir A., Identity&#150;based cryptosystems and signature schemes, Proceedings of CRYPTO'84 on Advances in Cryptology, 1985, pp. 47&#150;53, Santa Barbara, California, United States.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827585&pid=S1665-6423201100030000500003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; Gorantla M.C., Gangishetti R., and Saxena A., A survey on ID&#150;Based Cryptographic Primitives, Cryptology ePrint Archive, Report 2005/094, 2005.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827587&pid=S1665-6423201100030000500004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; Hess F., Efficient Identity Based Signature Schemes Based on Pairings, SAC '02: Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography, 2003, pp. 310&#150;324, Springer&#150;Verlag, London, UK.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827589&pid=S1665-6423201100030000500005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; Harrison K., Page D. and Smart N., Software Implementation of Finite Fields of Characteristic Three, for use in Pairing&#150;Based Cryptosystems, London Mathematical Society J.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827591&pid=S1665-6423201100030000500006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --> Comput. Math., Vol. 5, pp. 181-193, 2002.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827592&pid=S1665-6423201100030000500007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; Duursma I. And Lee H&#150;S., Tate Pairing Implementation for Hyperelliptic Curves y2= xp &#150; x + d, ASIACRYPT '03: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, 2003, Vol. 2894, pp. 111&#150;123, Springer&#150;Verlag.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827594&pid=S1665-6423201100030000500008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; Barreto P., Kim H. Y., Lynn B., and Scott M., Efficient Algorithms for Pairing&#150;Based Cryptosystems, CRYPTO '02: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, 2002, Vol. 2442, pp. 354&#150;368, Springer&#150;Verlag, London, UK.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827596&pid=S1665-6423201100030000500009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; Galbraith S. G., Harrison K. and Soldera D., Implementing the Tate Pairing, ANTS&#150;V: Proceedings of the 5th International Symposium on Algorithmic Number Theory, 2002, Vol. 2369, pp. 324&#150;337, Springer&#150;Verlag, London, UK.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827598&pid=S1665-6423201100030000500010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; Beuchat J&#150;L., Shirase M., Takagi T., and Okamoto E., An Algorithm for the T Pairing Calculation in Characteristic Three and its Hardware Implementation, ARITH '07: Proceedings of the 18th IEEE Symposium on Computer Arithmetic, 2007, pp. 97&#150;104, IEEE Computer Society, Washington, DC, USA.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827600&pid=S1665-6423201100030000500011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; Beuchat J&#150;L., Brisebarre N., Detrey J., Okamoto E., Shirase M., and Rodr&iacute;guez&#150;Henr&iacute;quez F., A Comparison Between Hardware Accelerators for the Modified Tate Pairing over F2m and F3m, Cryptology ePrint Archive, Report 2008/115, 2008.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827602&pid=S1665-6423201100030000500012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; Yang J&#150;H., and Chang C&#150;C., An ID&#150;Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem, Computers &amp; Security, 2009, Vol. 28, Issues 3&#150;4, pp. 138&#150;143.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827604&pid=S1665-6423201100030000500013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; Chang C&#150;C., Lin S&#150;Y., Yang J&#150;H., Efficient user authentication and key establishment protocols with perfect forward secrecy for mobile devices, Proceedings of the 2009 Ninth IEEE International Conference on Computer and Information Technology, 2009, Vol. 2, pp. 131&#150;135, Xiamen, China.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827606&pid=S1665-6423201100030000500014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; Niansheng L., Donghui G., and Jiaxiang H. AES Algorithm Implemented for PDA Secure Communication with Java, Anti&#150;counterfeiting, Security, Identification, 2007 IEEE, pp. 217&#150;222.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827608&pid=S1665-6423201100030000500015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; Kawahara Y., Takagi T., and Okamoto E., Efficient Implementation of Tate Pairing on a Mobile Phone Using Java, CIS, 2006, pp. 396&#150;405.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827610&pid=S1665-6423201100030000500016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;16&#93; Callas J., Donnerhacke L., Finney H., Shaw D., and Thayer R., RFC&#150;4880 OpenPGP Message Format, 2007.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827612&pid=S1665-6423201100030000500017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boneh]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Franklin]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Identity-Based Encryption from the Weil Pairing]]></article-title>
<source><![CDATA[Proceedings of CRYPTO '01, the 21st Annual International Cryptology Conference on Advances in Cryptology]]></source>
<year>2001</year>
<page-range>213-229</page-range><publisher-loc><![CDATA[London ]]></publisher-loc>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beuchat]]></surname>
<given-names><![CDATA[J-L.]]></given-names>
</name>
<name>
<surname><![CDATA[Brisebarre]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Detrey]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Okamoto]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Shirase]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Takagi]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Algorithms and Arithmetic Operators for Computing the T Pairing in Characteristic Three]]></article-title>
<source><![CDATA[IEEE Trans. Comput.]]></source>
<year>2008</year>
<volume>57</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1454-1468</page-range><publisher-loc><![CDATA[Washington ]]></publisher-loc>
<publisher-name><![CDATA[IEEE Computer Society]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Identity-based cryptosystems and signature schemes]]></article-title>
<source><![CDATA[Proceedings of CRYPTO'84 on Advances in Cryptology]]></source>
<year>1985</year>
<page-range>47-53</page-range><publisher-loc><![CDATA[Santa Barbara^eCalifornia California]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gorantla]]></surname>
<given-names><![CDATA[M.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Gangishetti]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Saxena]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[A survey on ID-Based Cryptographic Primitives, Cryptology ePrint Archive]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hess]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Efficient Identity Based Signature Schemes Based on Pairings, SAC '02]]></article-title>
<source><![CDATA[Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography]]></source>
<year>2003</year>
<page-range>310-324</page-range><publisher-loc><![CDATA[London ]]></publisher-loc>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Harrison]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Page]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Smart]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Software Implementation of Finite Fields of Characteristic Three, for use in Pairing-Based Cryptosystems]]></source>
<year></year>
<publisher-name><![CDATA[London Mathematical Society]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<source><![CDATA[J. Comput. Math.]]></source>
<year>2002</year>
<volume>5</volume>
<page-range>181-193</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>7</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duursma]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[H-S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Tate Pairing Implementation for Hyperelliptic Curves y2= xp - x + d, ASIACRYPT '03]]></article-title>
<source><![CDATA[Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security]]></source>
<year>2003</year>
<volume>2894</volume>
<page-range>111-123</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>8</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barreto]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[H. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lynn]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Scott]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Efficient Algorithms for Pairing-Based Cryptosystems, CRYPTO '02]]></article-title>
<source><![CDATA[Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology]]></source>
<year>2002</year>
<volume>2442</volume>
<page-range>354-368</page-range><publisher-loc><![CDATA[London ]]></publisher-loc>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>9</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Galbraith]]></surname>
<given-names><![CDATA[S. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Harrison]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Soldera]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Implementing the Tate Pairing, ANTS-V]]></article-title>
<source><![CDATA[Proceedings of the 5th International Symposium on Algorithmic Number Theory]]></source>
<year>2002</year>
<volume>2369</volume>
<page-range>324-337</page-range><publisher-loc><![CDATA[London ]]></publisher-loc>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beuchat]]></surname>
<given-names><![CDATA[J-L.]]></given-names>
</name>
<name>
<surname><![CDATA[Shirase]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Takagi]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Okamoto]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An Algorithm for the T Pairing Calculation in Characteristic Three and its Hardware Implementation, ARITH '07]]></article-title>
<source><![CDATA[Proceedings of the 18th IEEE Symposium on Computer Arithmetic]]></source>
<year>2007</year>
<page-range>97-104</page-range><publisher-loc><![CDATA[Washington^eDC DC]]></publisher-loc>
<publisher-name><![CDATA[IEEE Computer Society]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>11</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beuchat]]></surname>
<given-names><![CDATA[J-L.]]></given-names>
</name>
<name>
<surname><![CDATA[Brisebarre]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Detrey]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Okamoto]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Shirase]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez-Henríquez]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Comparison Between Hardware Accelerators for the Modified Tate Pairing over F2m and F3m, Cryptology ePrint Archive]]></source>
<year>2008</year>
</nlm-citation>
</ref>
<ref id="B13">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[J-H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[C-C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem]]></article-title>
<source><![CDATA[Computers & Security]]></source>
<year>2009</year>
<volume>28</volume>
<numero>3-4</numero>
<issue>3-4</issue>
<page-range>138-143</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>13</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[C-C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[S-Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[J-H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Efficient user authentication and key establishment protocols with perfect forward secrecy for mobile devices]]></article-title>
<source><![CDATA[Proceedings of the 2009 Ninth IEEE International Conference on Computer and Information Technology]]></source>
<year>2009</year>
<volume>2</volume>
<page-range>131-135</page-range><publisher-loc><![CDATA[Xiamen ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B15">
<label>14</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Niansheng]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Donghui]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiaxiang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[AES Algorithm Implemented for PDA Secure Communication with Java, Anti-counterfeiting, Security, Identification]]></source>
<year>2007</year>
<page-range>217-222</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kawahara]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Takagi]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Okamoto]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Efficient Implementation of Tate Pairing on a Mobile Phone Using Java]]></source>
<year>2006</year>
<page-range>396-405</page-range><publisher-name><![CDATA[CIS]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>16</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Callas]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Donnerhacke]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Finney]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Shaw]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Thayer]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[RFC-4880 OpenPGP Message Format]]></source>
<year>2007</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
