نتایج جستجو برای: bilinear pairing

تعداد نتایج: 34449  

2011
Wan An Xiong Yao Huan Gong

MANET(Moving Ad hoc Network) is a convenient infrastructure-less communication network which is commonly susceptible to various attacks. Many key management schemes for MANETs are presented to solve various security problems. Identity (ID)-based cryptography with threshold secret sharing ,ECC and Bilinear Pairing computation is a popular approach for the key management design. In this article, ...

2015
T. Punitha M. Sindhu

Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. Because ECC helps to establish equivalent sec...

2012
Rama Chandra Rao P. V. Lakshmi N. Ravi Shankar X. Deng C. H. Lee Haibo Tian Xiaofeng Chen Yong Ding

The aim of an efficient deniable authentication protocol is to enable a receiver to identify the source of a given message but not to prove the identity of the sender. Lu and Cao [7,10] confirmed that the previous protocols had a common weakness in which any third party can impersonate the intended receiver to verify the signature of the given message, and they proposed a new protocol based on ...

Journal: :CoRR 2013
Nadia El Mrabet Laurent Poinsot

Pairings are particular bilinear maps, and as any bilinear maps they factor through the tensor product as group homomorphisms. Besides, nothing seems to prevent us to construct pairings on other abelian groups than elliptic curves or more general abelian varieties. The point of view adopted in this contribution is based on these two observations. Thus we present an elliptic curve free study of ...

2006
Masaaki Shirase Tsuyoshi Takagi Eiji Okamoto

Recently Tate pairing and its variations are attracted in cryptography. Their operations consist of a main iteration loop and a final exponentiation. The final exponentiation is necessary for generating a unique value of the bilinear pairing in the extension fields. The speed of the main loop has become fast by the recent improvements, e.g., the Duursma-Lee algorithm and ηT pairing. In this pap...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه امام رضا علیه السلام - دانشکده مهندسی برق و کامپیوتر 1392

یکی از مهم ترین چالش ها در شبکه هوشمند برق، مفاهیم امنیتی وحفظ حریم خصوصی است. شبکه هوشمند برق یک سیستم آسیب پذیر است و در سطوح مختلف می تواند مورد حمله قرار گیرد. یکی از مهم ترین اجزای شبکه هوشمند برق، کنتور هوشمند است. کنتور هوشمند یکی از پیشرفته ترین کنتورهای اندازه گیری مصرف انرژی الکتریسیته با قابلیت مقایسه اطلاعات با دیگر کنتورها است. در واقع کنتور هوشمند، دروازه بین شبکه خانگی و شبکه خار...

Journal: :Theor. Comput. Sci. 2015
Xiaofeng Chen Willy Susilo Jin Li Duncan S. Wong Jianfeng Ma Shaohua Tang Qiang Tang

The computation of bilinear pairings has been considered the most expensive operation in pairing-based cryptographic protocols. In this paper, we first propose an efficient and secure outsourcing algorithm for bilinear pairings in the two untrusted program model. Compared with the state-of-the-art algorithm, a distinguishing Preprint submitted to Theoretical Computer Science 18 April 2014 prope...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید