Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
The Xedni Calculus and the Elliptic Curve Discrete LogarithmProblem
Designs, Codes and Cryptography
Analysis of the Xedni Calculus Attack
Designs, Codes and Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Elliptic Curve Discrete Logarithms and the Index Calculus
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
A more efficient and faster pairing computation with cryptographic security
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 0.00 |
There are many bilinear pairings that naturally appear when one studies elliptic curves, abelian varieties, and related groups. Some of these pairings, notably the Weil and Lichtenbaum-Tate pairings, can be defined over finite fields and have important applications in cryptography. Others, such as the Néron-Tate canonical height pairing and the Cassels-Tate pairing on the Shafarevich-Tate group, are of fundamental importance in number theory and arithmetic geometry, but have seen limited use in cryptography. In this article I will present a survey of some of the pairings that are used to study elliptic curves and abelian varieties. I will attempt to show why they are natural pairings and how they fit into a wider framework.