may still be computationally more efficient than X.509 certified HIs, since our mea-
sured average times of online certificate revocation check are longer than our measured
average HIP Base Exchange times for trusted IBE HIs, and since certificate verification
with revocation check is required far more frequently for X.509 certified HIs than for
trusted IBE HIs.
References
1. Gurtov, A.: Host Identity Protocol (HIP): Towards the Secure Mobile Internet. Wiley (2008)
2. Andersen, D.G., et al.: Accountable internet protocol (aip). In: Proceedings of SIGCOMM
2008. (2008) 339–350
3. Camarillo, G., Melen, J.: HIP (Host Identity Protocol) Immediate Carriage and Conveyance
of Upperlayer Protocol Signalling (HICCUPS) (2010) Internet Draft.
4. Lagutin, D.: Securing the Internet with Digital Signatures. PhD thesis, Aalto University,
Department of Computer Science and Engineering, Espoo, Finland (2010)
5. P1363 Working Group: IEEE P1363.3
TM
/D1 Draft Standard for Identity-based Public-key
Cryptography Using Pairings. IEEE. (2008) Retrieved October 19th, 2008 from http://
grouper.ieee.org/groups/1363/IBC/material/P1363.3-D1-200805.pdf.
6. PBC library Retrieved January 10, 2013, from http://crypto.stanford.edu/pbc/.
7. Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptographic protocols: A survey. Cryp-
tology ePrint Archive, Report 2004/064 (2004) Retrieved November 15th, 2012 from
http://eprint.iacr.org/2004/131.
8. Hess, F.: Efficient identity based signature schemes based on pairings. In: SAC 2002. Volume
2595 of LNCS., Springer-Verlag (2002) 310–324
9. Barreto, P., Libert, B., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure
identity-based signatures and signcryption from bilinear maps. In: Asiacrypt. Volume 3788
of LNCS., Springer-Verlag (2005) 515–532
10. Forsgren, H., Grahn, K., Karvi, T., Pulkkis, G.: Security and trust of public key cryptography
options for HIP. In: 10th IEEE International Conference on Computer and Information
Technology (CIT 2010), IEEE Conference Publications (2010) 1079–1084
11. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM Journal of
Computing 32(3) (2003) 586–615
12. OpenHIP overview (March 2012) Retrieved November 25, 2012 from http://
www.openhip.org/wiki/index.php?title=Overview.
13. Helsinki Institute for Information Technology: HIP for Linux (2004) Retrieved November
25, 2012 from http://infrahip.hiit.fi/index.php?index=about.
14. Ericsson Ab, NomadicLab: HIP for inter.net project (2008) Retrieved November 25, 2012
from http://hip4inter.net/.
15. CuteHIP project Retrieved November 24, 2012 from http://code.google.com/p/cutehip/.
16. Kuptsov, D.: Implementing CuteHIP: Feasibility analysis of Java-based network-layer secu-
rity protocols. Technical report, Aalto University (2011) Retrieved November 24, 2012 from
http://www.hiit.fi/u/kuptsov/resources/cutehip.pdf.
17. Modified OpenHIP 0.7 Retrieved February 3, 2013, from http://www.cs.helsinki.fi/u/
hforsgre/openhip.
52