نتایج جستجو برای: bilinear pairing
تعداد نتایج: 34449 فیلتر نتایج به سال:
Let $A$ be an abelian topological group and $B$ a trivial topological $A$-module. In this paper we define the second bilinear cohomology with a trivial coefficient. We show that every abelian group can be embedded in a central extension of abelian groups with bilinear cocycle. Also we show that in the category of locally compact abelian groups a central extension with a continuous section can b...
In this paper we construct and consider a new group-based digital signature scheme with evolving secret key, which is built using bilinear map. This map an asymmetric pairing of Type 3, although, for the reason paper, it treated in completely abstract fashion ought to be viewed as being actually defined over $E(\FF_{q^{n}})[p]\times E(\FF_{q^{nk}})[p]\to \FF_{q^{nk}}[p]$. The crucial element ke...
Let Γ be a connected bridgeless metric graph, and fix point v of Γ. We define combinatorial iterated integrals on along closed paths at v, unipotent generalization the usual cycle pairing analogue Chen's Riemann surfaces. These descend to bilinear between group algebra fundamental tensor first homology Γ, ∫:Zπ1(Γ,v)×TH1(Γ,R)→R. show that this two-step quotient allows one recover base-point up w...
We show that the recent structure-preserving signature (SPS) scheme of Kiltz, Pan and Wee [CRYPTO 2015], provably secure under the standard bilinear pairings group assumption SXDH, can be improved to have one less group element and one less pairing product equation in the signature verification step. Our improved SPS scheme only requires six group elements (five in one group, and one in the oth...
as an application of hirota bilinear method, perturbation expansion truncated at different levels is used to obtain exact soliton solutions to (2+1)-dimensional nonlinear evolution equation in much simpler way in comparison to other existing methods. we have derived bilinear form of nonlinear evolution equation and using this bilinear form, bilinear backlund transformations and construction of ...
We present efficient Identity-Based Encryption (IBE) under the Symmetric External DiffieHellman (SXDH) assumption in bilinear groups. In our IBE scheme, all parameters have constant numbers of group elements, and are shorter than those of previous constructions based on Decisional Linear (DLIN) assumption. Our construction uses both dual system encryption (Waters, Crypto ’09) and dual pairing v...
We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symmetric External Diffie-Hellman (SXDH) assumption in bilinear groups; our IBE scheme also achieves anonymity. In both the IBE and the signature schemes, all parameters have constant numbers of group elements, and are shorter than those of previous constructions based on Decisional Linear (DLIN) assumption. Ou...
Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss [4] to provide delegation of decryption rights. PRE allows re-encryption of a ciphertext intended for Alice (delegator) to a ciphertext for Bob (delegatee) via a semi-honest proxy, who should not learn anything about the underlying message. In 2003, Al-Riyami and Patterson introduced the notion of ce...
Advances in integrated circuit and wireless communication technologies are making body area networks (WBANs) an increasingly important medical paradigm. By collecting, uploading, processing real-time physical parameters, WBANs assist clients better recognizing managing their bodies. Besides conveniences it brings, facing the risk of clients’ privacy leakage during data transmission. Anon...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید