Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
PAIRING
2009
Springer
119views Cryptology» more  PAIRING 2009»
12 years 1 months ago
Compact E-Cash and Simulatable VRFs Revisited
Abstract. Efficient non-interactive zero-knowledge proofs are a powerful tool for solving many cryptographic problems. We apply the recent Groth-Sahai (GS) proof system for pairing...
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, A...
PAIRING
2009
Springer
142views Cryptology» more  PAIRING 2009»
12 years 1 months ago
Strongly Secure Certificateless Key Agreement
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...
PAIRING
2009
Springer
162views Cryptology» more  PAIRING 2009»
12 years 1 months ago
On the Security of Pairing-Friendly Abelian Varieties over Non-prime Fields
Naomi Benger, Manuel Charlemagne, David Mandell Fr...
PAIRING
2009
Springer
125views Cryptology» more  PAIRING 2009»
12 years 1 months ago
Universally Composable Adaptive Priced Oblivious Transfer
Alfredo Rial, Markulf Kohlweiss, Bart Preneel
PAIRING
2009
Springer
117views Cryptology» more  PAIRING 2009»
12 years 1 months ago
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
A number of previous papers explored the notion of identity-based group signature. We present a generic construction of identity-based group signatures. Our construction is based o...
Nigel P. Smart, Bogdan Warinschi
PAIRING
2009
Springer
111views Cryptology» more  PAIRING 2009»
12 years 1 months ago
Faster Pairings on Special Weierstrass Curves
This paper presents efficient formulas for computing cryptographic pairings on the curve y2 = cx3 + 1 over fields of large characteristic. We provide examples of pairing-friendly...
Craig Costello, Hüseyin Hisil, Colin Boyd, Ju...
PAIRING
2009
Springer
124views Cryptology» more  PAIRING 2009»
12 years 1 months ago
Fast Hashing to G2 on Pairing-Friendly Curves
When using pairing-friendly ordinary elliptic curves over prime fields to implement identity-based protocols, there is often a need to hash identities to points on one or both of ...
Michael Scott, Naomi Benger, Manuel Charlemagne, L...
books