On the Efficient Implementation of Pairing-Based Protocols

@inproceedings{Scott2011OnTE,
  title={On the Efficient Implementation of Pairing-Based Protocols},
  author={Michael Scott},
  booktitle={IMACC},
  year={2011}
}
  • Michael Scott
  • Published in IMACC 2011
  • Computer Science
  • The advent of Pairing-based protocols has had a major impact on the applicability of cryptography to the solution of more complex real-world problems. However there has always been a question mark over the performance of such protocols. In response much work has been done to optimize pairing implementation, and now it is generally accepted that being pairing-based does not preclude a protocol from consideration as a practical proposition. However although a lot of effort has gone into the… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 54 CITATIONS, ESTIMATED 94% COVERAGE

    A pairing-based cryptographic approach for data security in the cloud

    VIEW 5 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Tactical CAC profile for NATO OLP? Performance estimations for NATO OLP cryptographic evolution stage

    VIEW 4 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Software Implementation of an Attribute-Based Encryption Scheme

    VIEW 10 EXCERPTS
    CITES BACKGROUND, RESULTS & METHODS
    HIGHLY INFLUENCED

    Pairing-Based Cryptography – Pairing 2013

    VIEW 5 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

    VIEW 5 EXCERPTS
    CITES BACKGROUND & RESULTS
    HIGHLY INFLUENCED

    Leakage-Resilient Certificateless Key Encapsulation Scheme

    VIEW 4 EXCERPTS
    CITES BACKGROUND, RESULTS & METHODS
    HIGHLY INFLUENCED

    A Practically Optimized Implementation of Attribute Based Cryptosystems

    • Chunqiang Hu, Fan Zhang, +3 authors Guilin Huang
    • Computer Science
    • 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
    • 2014
    VIEW 4 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Implementing Pairings at the 192-bit Security Level

    VIEW 7 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    2011
    2019

    CITATION STATISTICS

    • 9 Highly Influenced Citations

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 38 REFERENCES

    Fixed Argument Pairings

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Self-Protecting Electronic Medical Records Using Attribute-Based Encryption

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    A Taxonomy of Pairing-Friendly Elliptic Curves

    VIEW 4 EXCERPTS

    Inner-product encryption under standard assumptions

    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    An Analysis of Affine Coordinates for Pairing Computation

    VIEW 5 EXCERPTS
    HIGHLY INFLUENTIAL

    Affine Pairings on ARM

    VIEW 2 EXCERPTS