نتایج جستجو برای: bilinear pairing

تعداد نتایج: 34449  

2005
Philipp Grabher Dan Page

Although identity based cryptography offers many functional advantages over conventional public key alternatives, the computational costs are significantly greater. The core computational task is evaluation of a bilinear map, or pairing, over elliptic curves. In this paper we prototype and evaluate polynomial and normal basis field arithmetic on an FPGA device and use it to construct a hardware...

Journal: :IACR Cryptology ePrint Archive 2008
Emanuele Cesena

A Trace Zero Variety is a specific subgroup of the group of the divisor classes on a hyperelliptic curve C/Fq, which are rational over a small degree extension Fqr of the definition field. Trace Zero Varieties (TZV) are interesting for cryptographic applications since they enjoy properties that can be exploited to achieve fast arithmetic and group construction. Furthermore, supersingular TZV al...

2006
Seung Geol Choi Kunsoo Park Moti Yung

We propose a short traceable signature scheme based on bilinear pairings. Traceable signatures, introduced by Kiayias, Tsiounis and Yung (KTY), support an extended set of fairness mechanisms (mechanisms for anonymity management and revocation) when compared with the traditional group signatures. Designing short signatures based on the power of pairing has been a current activity of cryptographi...

Journal: :IACR Cryptology ePrint Archive 2011
Debiao He Jin Hu

Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public-key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the s...

2005
Pavel Cejnar Hendrik B. Geyer

We argue that fermion-boson mapping techniques represent a natural tool for studying manybody supersymmetry in fermionic systems with pairing. In particular, using the generalized Dyson mapping of a many-level fermion superalgebra with the SU(2) type of pairing we investigate two kinds of supersymmetry connecting excitations in the systems with even and odd particle numbers: dynamical supersymm...

2003
Dirk Balfanz Glenn Durfee Narendar Shankar Diana K. Smetters Jessica Staddon Hao-Chi Wong

Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that the CIA server does not want to reveal its CIA credentials to anyone but CIA agents – not even to other CIA servers. In this paper we first show how pairing-based cryptography can be used to implement such secret handsh...

Journal: :I. J. Network Security 2014
Yunqi Dou Jiang Weng Chuangui Ma

In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been developed. With the enhancement of implementation efficiency, the algorithms of pairings are usually embedded in identity aware devices such as smartcards. Although many fault attacks and countermeasures for public key and elliptic curve cryptographic systems are known, the security of pairing ...

Journal: :Mathematical and Computer Modelling 2011
Debiao He Yitao Chen Jianhua Chen Rui Zhang Weiwei Han

Certificateless public key cryptography (CLPKC), which can simplify the complex certificate management in the traditional public key cryptography and resolve the key escrow problem in identity-based cryptography, has been widely studied. As an important part of CLPKC, certificateless two-party authenticated key agreement (CTAKA) protocols have also received considerable attention. Recently, man...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید