Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special Section: Fuzzy theoretical model analysis for signal processing
Guest editors: Valentina E. Balas, Jer Lang Hong, Jason Gu and Tsung-Chih Lin
Article type: Research Article
Authors: Yi, Haibo; * | Chi, Ruinan; * | Nie, Zhe
Affiliations: School of Computer Engineering, Shenzhen Polytechnic, Shenzhen, Guangdong, China
Correspondence: [*] Corresponding authors. Haibo Yi, School of Computer Engineering, Shenzhen Polytechnic, Shenzhen, Guangdong, China. E-mail: [email protected]; Ruinan Chi, School of Computer Engineering, Shenzhen Polytechnic, Shenzhen, Guangdong, China. E-mail: [email protected].
Abstract: There has been a continuous and increasing interest in research and application of Wireless Sensor Networks (WSNs). Although the future of WSNs is very prospective, the security issues become more and more important because they are used for very critical applications in engineering areas. Furthermore, they are very vulnerable and thus attractive to attacks because of human-unattended deployment and their limited prices. Generally, they are protected by public key cryptosystems. Such systems depends on the difficulty of the elliptic curve discrete logarithms or integer factorizations. However, they can be attacked by Shor’s algorithm on quantum computers. Multivariate Public Key Cryptography (MPKC) schemes are secure to attacks by quantum computers. Among such schemes, multivariate signatures use various multiplications in a finite field, which are time-consuming operations during signature generations. Thus, we focus on improving multiplications in finite fields for multivariate signatures. We propose a variant of Mastrovito multiplications based on trinomial, Special Trinomial (ST), pentanomial, Special Pentanomial (SP), Equally-spaced-polynomial (ESP), All-One-polynomial (AOP), and successive-one-polynomial (SOP). Our design is implemented on hardware and can be used to improve the implementations of multivariate signatures including UOV, enTTS and Rainbow for protecting data security in WSNs.
Keywords: Multiplication, finite field, wireless sensor networks (WSNs), multivariate signature
DOI: 10.3233/JIFS-179291
Journal: Journal of Intelligent & Fuzzy Systems, vol. 37, no. 4, pp. 4575-4584, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]