Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Group signatures with verifier-local revocation
Proceedings of the 11th ACM conference on Computer and communications security
Discrete Applied Mathematics
Verifiably Encrypted Signatures from RSA without NIZKs
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Biometric identity based signature revisited
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Non-interactive distributed encryption: a new primitive for revocable privacy
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Variants of waters' dual system primitives using asymmetric pairings
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
One-Move convertible nominative signature in the standard model
ProvSec'12 Proceedings of the 6th international conference on Provable Security
International Journal of Applied Cryptography
Hi-index | 0.04 |
In this paper, we examine the hard problems underlying asymmetric pairings, their precise relationships and how they affect a number of existing protocols. Furthermore, we present a new model for the elliptic curve groups used in asymmetric pairings, which allows both an efficient pairing and an efficiently computable isomorphism.