Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Unbelievable Security. Matching AES Security Using Public Key Systems
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A One Round Protocol for Tripartite Diffie–Hellman
Journal of Cryptology
Short Signatures from the Weil Pairing
Journal of Cryptology
Group signatures with verifier-local revocation
Proceedings of the 11th ACM conference on Computer and communications security
New paradigms in signature schemes
New paradigms in signature schemes
On computable isomorphisms in efficient asymmetric pairing-based systems
Discrete Applied Mathematics
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
Identity-based key agreement protocols from pairings
International Journal of Information Security
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Discrete Applied Mathematics
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Efficient and generalized pairing computation on Abelian varieties
IEEE Transactions on Information Theory
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Comparing two pairing-based aggregate signature schemes
Designs, Codes and Cryptography
Pairing calculation on supersingular genus 2 curves
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Explicit formulas for efficient multiplication in F36m
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Dynamic fully anonymous short group signatures
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Fast bilinear maps from the tate-lichtenbaum pairing on hyperelliptic curves
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A short verifier-local revocation group signature scheme with backward unlinkability
IWSEC'06 Proceedings of the 1st international conference on Security
High-speed parallel software implementation of the ηT pairing
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
IEEE Transactions on Information Theory
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Optimal eta pairing on supersingular genus-2 binary hyperelliptic curves
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Group-signature schemes on constrained devices: the gap between theory and practice
Proceedings of the First Workshop on Cryptography and Security in Computing Systems
Hi-index | 0.00 |
We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timings for Type 1 pairings derived from supersingular elliptic curves in characteristic 2 and 3 and the first timings for supersingular genus-2 curves in characteristic 2 at the 128- bit security level. In the case of Type 4 pairings, our main contribution is a new method for hashing into G2 which makes the Type 4 setting almost as efficient as Type 3. On the security front, for some well-known protocols we discuss to what extent the security arguments are tenable when one moves to genus-2 curves in the Type 1 case. In Type 4, we observe that the Boneh-Shacham group signature scheme, the very first protocol for which Type 4 setting was introduced in the literature, is trivially insecure, and we describe a small modification that appears to restore its security.