نتایج جستجو برای: bilinear pairing

تعداد نتایج: 34449  

Let $A$ be an abelian topological group and $B$ a trivial topological $A$-module. In this paper we define the second bilinear cohomology with a trivial coefficient. We show that every abelian group can be embedded in a central extension of abelian groups with bilinear cocycle. Also we show that in the category of locally compact abelian groups a central extension with a continuous section can b...

Journal: :International Journal of Electronics and Telecommunications 2023

In this paper we construct and consider a new group-based digital signature scheme with evolving secret key, which is built using bilinear map. This map an asymmetric pairing of Type 3, although, for the reason paper, it treated in completely abstract fashion ought to be viewed as being actually defined over $E(\FF_{q^{n}})[p]\times E(\FF_{q^{nk}})[p]\to \FF_{q^{nk}}[p]$. The crucial element ke...

Journal: :Advances in Applied Mathematics 2021

Let Γ be a connected bridgeless metric graph, and fix point v of Γ. We define combinatorial iterated integrals on along closed paths at v, unipotent generalization the usual cycle pairing analogue Chen's Riemann surfaces. These descend to bilinear between group algebra fundamental tensor first homology Γ, ∫:Zπ1(Γ,v)×TH1(Γ,R)→R. show that this two-step quotient allows one recover base-point up w...

Journal: :IACR Cryptology ePrint Archive 2017
Charanjit S. Jutla Arnab Roy

We show that the recent structure-preserving signature (SPS) scheme of Kiltz, Pan and Wee [CRYPTO 2015], provably secure under the standard bilinear pairings group assumption SXDH, can be improved to have one less group element and one less pairing product equation in the signature verification step. Our improved SPS scheme only requires six group elements (five in one group, and one in the oth...

Journal: :computational methods for differential equations 0
manjit singh yadavindra college of engineering, punjabi university guru kashi campus, talwandi sabo

as an application of hirota bilinear method, perturbation expansion truncated at different levels is used to obtain exact soliton solutions to (2+1)-dimensional nonlinear evolution equation in much simpler way in comparison to other existing methods. we have derived bilinear form of nonlinear evolution equation and using this bilinear form, bilinear backlund transformations and construction of ...

Journal: :Des. Codes Cryptography 2014
Jie Chen Hoon Wei Lim San Ling Huaxiong Wang Hoeteck Wee

We present efficient Identity-Based Encryption (IBE) under the Symmetric External DiffieHellman (SXDH) assumption in bilinear groups. In our IBE scheme, all parameters have constant numbers of group elements, and are shorter than those of previous constructions based on Decisional Linear (DLIN) assumption. Our construction uses both dual system encryption (Waters, Crypto ’09) and dual pairing v...

Journal: :IACR Cryptology ePrint Archive 2012
Jie Chen Hoon Wei Lim San Ling Huaxiong Wang Hoeteck Wee

We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symmetric External Diffie-Hellman (SXDH) assumption in bilinear groups; our IBE scheme also achieves anonymity. In both the IBE and the signature schemes, all parameters have constant numbers of group elements, and are shorter than those of previous constructions based on Decisional Linear (DLIN) assumption. Ou...

2017
S. Sharmila Deva Selvi Arinjita Paul C. Pandu Rangan

Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss [4] to provide delegation of decryption rights. PRE allows re-encryption of a ciphertext intended for Alice (delegator) to a ciphertext for Bob (delegatee) via a semi-honest proxy, who should not learn anything about the underlying message. In 2003, Al-Riyami and Patterson introduced the notion of ce...

Journal: :IEEE Access 2022

Advances in integrated circuit and wireless communication technologies are making body area networks (WBANs) an increasingly important medical paradigm. By collecting, uploading, processing real-time physical parameters, WBANs assist clients better recognizing managing their bodies. Besides conveniences it brings, facing the risk of clients’ privacy leakage during data transmission. Anon...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید