{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:10:12Z","timestamp":1769825412960,"version":"3.49.0"},"reference-count":63,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T00:00:00Z","timestamp":1298937600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T00:00:00Z","timestamp":1298937600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1016\/j.comcom.2010.05.013","type":"journal-article","created":{"date-parts":[[2010,5,26]],"date-time":"2010-05-26T05:07:07Z","timestamp":1274850427000},"page":"485-493","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":132,"title":["TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks"],"prefix":"10.1016","volume":"34","author":[{"given":"Leonardo B.","family":"Oliveira","sequence":"first","affiliation":[]},{"given":"Diego F.","family":"Aranha","sequence":"additional","affiliation":[]},{"given":"Conrado P.L.","family":"Gouv\u00eaa","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Scott","sequence":"additional","affiliation":[]},{"given":"Danilo F.","family":"C\u00e2mara","sequence":"additional","affiliation":[]},{"given":"Julio","family":"L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Dahab","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2010.05.013_b0005","series-title":"15th Annual International Conference on Mobile Computing and Networking (MOBICOM\u201999)","first-page":"263","article-title":"Next century challenges: scalable coordination in sensor networks","author":"Estrin","year":"1999"},{"key":"10.1016\/j.comcom.2010.05.013_b0010","unstructured":"R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairing, in: Symposium on Cryptography and Information Security (SCIS\u201900), 2000, pp. 26\u201328."},{"key":"10.1016\/j.comcom.2010.05.013_b0015","series-title":"The Fifth International Symposium on Algorithmic Number Theory (ANTS-V)","first-page":"20","article-title":"The weil and tate pairings as building blocks for public key cryptosystems","volume":"Vol. 2369","author":"Joux","year":"2002"},{"issue":"3","key":"10.1016\/j.comcom.2010.05.013_b0020","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","article-title":"Identity-based encryption from the weil pairing","volume":"32","author":"Boneh","year":"2003","journal-title":"SIAM Journal of Computing"},{"key":"10.1016\/j.comcom.2010.05.013_b0025","series-title":"Fourth Annual International Cryptology Conference (CRYPTO\u201984)","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","volume":"Vol. 196","author":"Shamir","year":"1984"},{"issue":"2\u20133","key":"10.1016\/j.comcom.2010.05.013_b0030","first-page":"293","article-title":"Secure routing in wireless sensor networks: attacks and countermeasures","volume":"1","author":"Karlof","year":"2003","journal-title":"Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols"},{"key":"10.1016\/j.comcom.2010.05.013_b0035","series-title":"Second International Conference on Embedded Networked Sensor Systems (SenSys\u201904)","first-page":"162","article-title":"TinySec: a link layer security architecture for wireless sensor networks","author":"Karlof","year":"2004"},{"key":"10.1016\/j.comcom.2010.05.013_b0040","series-title":"First International Conference on Cryptology in Malaysia (MYCRYPT\u201905)","first-page":"229","article-title":"Security of two-party identity-based key agreement","volume":"Vol. 3715","author":"Boyd","year":"2005"},{"issue":"6","key":"10.1016\/j.comcom.2010.05.013_b0045","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MM.2002.1134340","article-title":"Mica: A wireless platform for deeply embedded networks","volume":"22","author":"Hill","year":"2002","journal-title":"IEEE Micro"},{"key":"10.1016\/j.comcom.2010.05.013_b0050","series-title":"Fourth International Symposium on Information processing in Sensor Networks (IPSN\u201905)","first-page":"364","article-title":"Telos: enabling ultra-low power wireless research","author":"Polastre","year":"2005"},{"key":"10.1016\/j.comcom.2010.05.013_b0055","series-title":"Fourth International Symposium on Information Processing in Sensor Networks (IPSN\u201905)","first-page":"437","article-title":"The intel mote platform: a bluetooth-based sensor network for industrial monitoring","author":"Nachman","year":"2005"},{"key":"10.1016\/j.comcom.2010.05.013_b0060","unstructured":"D.F. Aranha, RELIC Cryptographic Toolkit, <http:\/\/code.google.com\/p\/relic-toolkit>, 2009."},{"key":"10.1016\/j.comcom.2010.05.013_b0065","series-title":"Handbook of Applied Cryptography","author":"Menezes","year":"1996"},{"key":"10.1016\/j.comcom.2010.05.013_b0070","unstructured":"D.W. Carman, P.S. Kruus, B.J. Matt, Constraints and approaches for distributed sensor network security, Technical Report 00-010, NAI Labs, Network Associates, Inc. 2000."},{"issue":"5","key":"10.1016\/j.comcom.2010.05.013_b0075","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"SPINS: security protocols for sensor networks","volume":"8","author":"Perrig","year":"2002","journal-title":"Wireless Networks"},{"key":"10.1016\/j.comcom.2010.05.013_b0080","series-title":"Ninth ACM Conference on Computer and Communications Security (CCS\u201902)","first-page":"41","article-title":"A key management scheme for distributed sensor networks","author":"Eschenauer","year":"2002"},{"key":"10.1016\/j.comcom.2010.05.013_b0085","series-title":"10th ACM Conference on Computer and communication security (CCS\u201903)","first-page":"62","article-title":"LEAP: efficient security mechanisms for large scale distributed sensor networks","author":"Zhu","year":"2003"},{"key":"10.1016\/j.comcom.2010.05.013_b0090","series-title":"First ACM Workshop on Security of ad hoc and Sensor Networks (SASN\u201903)","first-page":"62","article-title":"Random key-assignment for secure wireless sensor networks","author":"Pietro","year":"2003"},{"key":"10.1016\/j.comcom.2010.05.013_b0095","series-title":"IEEE Symposium on Security and Privacy (S & P\u201903)","first-page":"197","article-title":"Random key predistribution schemes for sensor networks","author":"Chan","year":"2003"},{"key":"10.1016\/j.comcom.2010.05.013_b0100","unstructured":"R. Kannan, L. Ray, A. Durresi, Security-performance trade-offs of inheritance based key predistribution for wireless sensor networks, in: First European Workshop on Security in Wireless and ad hoc Sensor Networks (ESAS\u201904), 2004."},{"key":"10.1016\/j.comcom.2010.05.013_b0105","doi-asserted-by":"crossref","unstructured":"J. Hwang, Y. Kim, Revisiting random key predistribution schemes for wireless sensor networks, in: S. Setia, V. Swarup (Eds.), Second ACM Workshop on Security of ad hoc and Sensor Networks (SASN\u201904), 2004, pp. 43\u201352.","DOI":"10.1145\/1029102.1029111"},{"key":"10.1016\/j.comcom.2010.05.013_b0110","series-title":"Ninth European Symposium on Research Computer Security (ESORICS\u201904)","first-page":"293","article-title":"Combinatorial design of key distribution mechanisms for wireless sensor networks","volume":"Vol. 3193","author":"\u00c7amtepe","year":"2004"},{"issue":"2","key":"10.1016\/j.comcom.2010.05.013_b0115","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1145\/1065545.1065548","article-title":"A pairwise key predistribution scheme for wireless sensor networks","volume":"8","author":"Du","year":"2005","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"10.1016\/j.comcom.2010.05.013_b0120","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/1053283.1053287","article-title":"Establishing pairwise keys in distributed sensor networks","volume":"8","author":"Liu","year":"2005","journal-title":"ACM Transactions on Information and System Security"},{"issue":"3\/4","key":"10.1016\/j.comcom.2010.05.013_b0125","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1504\/IJSN.2007.013175","article-title":"On the design of secure protocols for hierarchical sensor networks","volume":"2","author":"Oliveira","year":"2007","journal-title":"International Journal of Security and Networks (IJSN)"},{"issue":"12","key":"10.1016\/j.comcom.2010.05.013_b0130","doi-asserted-by":"crossref","first-page":"2882","DOI":"10.1016\/j.sigpro.2007.05.016","article-title":"SecLEACH \u2013 on the security of clustered sensor networks","volume":"87","author":"Oliveira","year":"2007","journal-title":"Signal Processing"},{"key":"10.1016\/j.comcom.2010.05.013_b0135","series-title":"Second ACM Workshop on Security of ad hoc and Sensor Networks (SASN\u201904)","first-page":"59","article-title":"TinyPK: securing sensor networks with public key technology","author":"Watro","year":"2004"},{"key":"10.1016\/j.comcom.2010.05.013_b0140","series-title":"Workshop on Cryptographic Hardware and Embedded Systems (CHES\u201904)","first-page":"119","article-title":"Comparing elliptic curve cryptography and RSA on 8-bit CPUs","volume":"Vol. 3156","author":"Gura","year":"2004"},{"key":"10.1016\/j.comcom.2010.05.013_b0145","doi-asserted-by":"crossref","unstructured":"D.J. Malan, M. Welsh, M.D. Smith, A public key infrastructure for key distribution in tinyos based on elliptic curve cryptography, in: First IEEE International Conference on Sensor and ad hoc Communications and Networks (SECON\u201904), 2004, pp. 71\u201380.","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"10.1016\/j.comcom.2010.05.013_b0150","series-title":"Sixth ACM International Symposium on Mobile ad hoc Networking and Computing (MOBIHOC\u201905)","first-page":"58","article-title":"An efficient scheme for authenticating public keys in sensor networks","author":"Du","year":"2005"},{"key":"10.1016\/j.comcom.2010.05.013_b0155","series-title":"Advances in Elliptic Curve Cryptography","first-page":"215","article-title":"Cryptography from pairings","volume":"Vol. 317","author":"Paterson","year":"2005"},{"key":"10.1016\/j.comcom.2010.05.013_b0160","series-title":"Eighth IMA International Conference on Cryptography and Coding","first-page":"360","article-title":"An identity-based encryption scheme based on quadratic residues","volume":"Vol. 2260","author":"Cocks","year":"2001"},{"issue":"4","key":"10.1016\/j.comcom.2010.05.013_b0165","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/s00145-004-0312-y","article-title":"A one round protocol for tripartite Diffie\u2013Hellman","volume":"17","author":"Joux","year":"2004","journal-title":"Journal of Cryptology"},{"issue":"5","key":"10.1016\/j.comcom.2010.05.013_b0170","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/18.259647","article-title":"Reducing elliptic curve logarithms to logarithms in a finite field","volume":"39","author":"Menezes","year":"1993","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.comcom.2010.05.013_b0175","series-title":"Advances in Elliptic Curve Cryptography","first-page":"183","article-title":"Pairings","volume":"Vol. 317","author":"Galbraith","year":"2005"},{"issue":"16","key":"10.1016\/j.comcom.2010.05.013_b0180","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","article-title":"Pairings for cryptographers","volume":"156","author":"Galbraith","year":"2008","journal-title":"Discrete Applied Mathematics"},{"key":"10.1016\/j.comcom.2010.05.013_b0185","series-title":"Second ACM Conference on Wireless Network Security (WISEC\u201909)","first-page":"1","article-title":"On the application of pairing based cryptography to wireless sensor networks","author":"Szczechowiak","year":"2009"},{"key":"10.1016\/j.comcom.2010.05.013_b0190","series-title":"Second ACM International Conference on Wireless Sensor Networks and Applications (WSNA\u201903)","first-page":"151","article-title":"Analyzing and modeling encryption overhead for sensor network nodes","author":"Ganesan","year":"2003"},{"issue":"3","key":"10.1016\/j.comcom.2010.05.013_b0195","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s10623-006-9033-6","article-title":"Efficient pairing computation on supersingular abelian varieties","volume":"42","author":"Barreto","year":"2007","journal-title":"Designs Codes and Cryptography"},{"key":"10.1016\/j.comcom.2010.05.013_b0200","series-title":"Ninth International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT\u201903)","first-page":"111","article-title":"Tate pairing implementation for hyperelliptic curves y2=xp\u2212x+d","volume":"Vol. 2894","author":"Duursma","year":"2003"},{"key":"10.1016\/j.comcom.2010.05.013_b0205","unstructured":"Atmel, 8 bit AVR Microcontroller ATmega128(L) Manual, v. 2467M-AVR-11\/04, November 2004."},{"key":"10.1016\/j.comcom.2010.05.013_b0210","series-title":"14th International Workshop on Selected Areas in Cryptography (SAC 2007)","first-page":"138","article-title":"Another look at square-roots (and other less common operations) in fields of even characteristic","volume":"Vol. 4876","author":"Avanzi","year":"2007"},{"key":"10.1016\/j.comcom.2010.05.013_b0215","unstructured":"M. Scott, Optimal irreducible polynomials for GF(2m) arithmetic, Cryptology ePrint Archive, Report 2007\/192, 2007."},{"key":"10.1016\/j.comcom.2010.05.013_b0220","series-title":"First International Conference in Cryptology in India (INDOCRYPT\u201900)","first-page":"203","article-title":"High-speed software multiplication in GF(2m)","volume":"Vol. 1977","author":"L\u00f3pez","year":"2000"},{"issue":"8","key":"10.1016\/j.comcom.2010.05.013_b0225","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1109\/TC.2004.43","article-title":"Field inversion and point halving revisited","volume":"53","author":"Fong","year":"2004","journal-title":"IEEE Transactions on Computers"},{"key":"10.1016\/j.comcom.2010.05.013_b0230","unstructured":"Atmel Corporation, AVR Studio 4, URL <http:\/\/www.atmel.com\/>, 2005."},{"key":"10.1016\/j.comcom.2010.05.013_b0235","unstructured":"J. Eriksson, A. Dunkels, N. Finne, F. \u00d6sterlind, T. Voigt, MSPsim \u2013 an extensible simulator for msp430-equipped sensor boards, in: Fourth European Conference on Wireless Sensor Networks (EWSN\u201907), Poster\/Demo session, 2007, URL <http:\/\/www.sics.se\/adam\/eriksson07mspsim.pdf>."},{"key":"10.1016\/j.comcom.2010.05.013_b0240","doi-asserted-by":"crossref","unstructured":"J. Beuchat, N. Brisebarre, J. Detrey, E. Okamoto, F. Rodr\u00edguez-Henr\u00edquez, A comparison between hardware accelerators for the modified tate pairing over F2m and F3m, in: S.D. Galbraith, K.G. Paterson (Eds.), Second International Conference on Pairing-Based Cryptography (Pairing\u201908), 2008, pp. 297\u2013315.","DOI":"10.1007\/978-3-540-85538-5_20"},{"issue":"5","key":"10.1016\/j.comcom.2010.05.013_b0245","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1109\/TC.2007.70832","article-title":"Effects of instruction set extensions on an embedded processor: a case study on elliptic curve cryptography over gf(2m)","volume":"57","author":"Bartolini","year":"2008","journal-title":"IEEE Transactions on Computers"},{"key":"10.1016\/j.comcom.2010.05.013_b0250","unstructured":"A. Liu, P. Kampanakis, P. Ning, TinyECC: elliptic curve cryptography for sensor networks (Ver. 0.3), URL <http:\/\/discovery.csc.ncsu.edu\/software\/TinyECC\/>, 2005."},{"key":"10.1016\/j.comcom.2010.05.013_b0255","series-title":"12th Annual International Cryptology Conference (CRYPTO\u201992)","first-page":"148","article-title":"Perfectly-secure key distribution for dynamic conferences","volume":"Vol. 740","author":"Blundo","year":"1992"},{"key":"10.1016\/j.comcom.2010.05.013_b0260","doi-asserted-by":"crossref","unstructured":"R. Blom, An optimal class of symmetric key generation systems, in: Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT\u201984), 1984, pp. 335\u2013338.","DOI":"10.1007\/3-540-39757-4_22"},{"key":"10.1016\/j.comcom.2010.05.013_b0265","unstructured":"Y. Zhang, W. Liu, W. Lou, Y. Fang, Securing sensor networks with location-based keys, in: IEEE Wireless Communications and Networking Conference (WCNC\u201905), 2005."},{"issue":"4","key":"10.1016\/j.comcom.2010.05.013_b0270","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1093\/comjnl\/bxl023","article-title":"Security considerations and key negotiation techniques for power constrained sensor networks","volume":"49","author":"Doyle","year":"2006","journal-title":"The Computer Journal"},{"key":"10.1016\/j.comcom.2010.05.013_b0275","doi-asserted-by":"crossref","unstructured":"L.B. Oliveira, R. Dahab, J. Lopez, F. Daguano, A.A.F. Loureiro, Identity-based encryption for sensor networks, in: Fifth IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW\u201907), 2007, pp. 290\u2013294.","DOI":"10.1109\/PERCOMW.2007.56"},{"key":"10.1016\/j.comcom.2010.05.013_b0280","doi-asserted-by":"crossref","unstructured":"L.B. Oliveira, D.F. Aranha, E. Morais, F. Daguano, J. L\u00f3pez, R. Dahab, TinyTate: computing the tate pairing in resource-constrained nodes, in: Sixth IEEE International Symposium on Network Computing and Applications (NCA\u201907), 2007, pp. 318\u2013323.","DOI":"10.1109\/NCA.2007.48"},{"key":"10.1016\/j.comcom.2010.05.013_b0285","doi-asserted-by":"crossref","unstructured":"L.B. Oliveira, M. Scott, J. L\u00f3pez, R. Dahab, TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks, in: Fifth International Conference on Networked Sensing Systems (INSS\u201908), 2008, pp. 173\u2013180.","DOI":"10.1109\/INSS.2008.4610921"},{"key":"10.1016\/j.comcom.2010.05.013_b0290","unstructured":"M. Scott, MIRACL\u2014A multiprecision integer and rational arithmetic C\/C++ library, Shamus Software Ltd, Dublin, Ireland, URL <http:\/\/www.shamus.ie>, 2003."},{"key":"10.1016\/j.comcom.2010.05.013_b0295","unstructured":"T. Ishiguro, M. Shirase, T. Takagi, Efficient implementation of pairings on sensor nodes, in: Applications of Pairing-Based Cryptography \u2013 NIST, 2008, pp. 96\u2013106."},{"key":"10.1016\/j.comcom.2010.05.013_b0300","doi-asserted-by":"crossref","unstructured":"P. Szczechowiak, L.B. Oliveira, M. Scott, M. Collier, R. Dahab, NanoECC: testing the limits of elliptic curve cryptography in sensor networks, in: Fifth European Conference on Wireless Sensor Networks (EWSN\u201908), 2008, pp. 305\u2013320.","DOI":"10.1007\/978-3-540-77690-1_19"},{"key":"10.1016\/j.comcom.2010.05.013_b0305","unstructured":"L.B. Oliveira, A. Kansal, B. Priyantha, M. Goraczko, F. Zhao, Secure-TWS: authenticating node to multi-user communication in shared sensor networks, in: Eighth ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN\u201908), 2009, pp. 289\u2013300."},{"issue":"4","key":"10.1016\/j.comcom.2010.05.013_b0310","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","article-title":"Short signatures from the weil pairing","volume":"17","author":"Boneh","year":"2004","journal-title":"Journal of Cryptology"},{"key":"10.1016\/j.comcom.2010.05.013_b0315","series-title":"Seventh International Conference on Cryptology and Network Security (CANS\u201908)","first-page":"120","article-title":"A killer application for pairings: authenticated key establishment in underwater wireless sensor networks","volume":"Vol. 5339","author":"Galindo","year":"2008"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366410002483?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366410002483?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T23:19:06Z","timestamp":1758842346000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366410002483"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":63,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["S0140366410002483"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2010.05.013","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2011,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2010.05.013","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2010 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}