Pairing-based cryptography

Pairing-based cryptography is the use of a pairing between elements of two cryptographic groups to a third group with a mapping to construct or… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1985-2017
0204019852017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
This paper introduces pairing-based cryptography focusing on homomorphic cryptography. Pairing is a bilinear map from two… (More)
Is this relevant?
2008
2008
We show that supersingular Abelian varieties can be used to obtain higher MOV security per bit, in all characteristics, than… (More)
  • table 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
  • Greg Zaverucha
  • 2006
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x Acknowledgements… (More)
  • table 1.1
  • figure 2.1
  • table 3.1
  • figure 4.1
  • table 4.1
Is this relevant?
2006
2006
Current fault attacks against public key cryptography focus on traditional schemes, such as RSA and ECC, and, to a lesser extent… (More)
Is this relevant?
2006
2006
The security and performance of pairing based cryptography has provoked a large volume of research, in part because of the… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
Is this relevant?
2004
2004
Acknowledgements I would like to take this opportunity to express my gratitude to some people who were involved in this project… (More)
  • figure 1.1
  • figure 1.2
  • table 2.1
  • figure 4.1
  • table 6.1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
ID-based cryptosystems have many advantages over PKI based cryptosystems in key distribution, but they also have an inherent… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the… (More)
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques… (More)
Is this relevant?