Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
Pairing-based cryptography
Pairing-based cryptography is the use of a pairing between elements of two cryptographic groups to a third group with a mapping to construct or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Cryptosystem
Decision Linear assumption
Decisional Diffie–Hellman assumption
Diffie–Hellman problem
Expand
Broader (1)
Elliptic curve cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Efficient privacy preserving device authentication in WBANs for industrial e-health applications
Vanga Odelu
,
Sourav Saha
,
R. Prasath
,
Lakshminarayana Sadineni
,
M. Conti
,
Minho Jo
Computers & security
2019
Corpus ID: 88492295
2017
2017
Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage
Hyunsoo Kwon
,
Changhee Hahn
,
Dongyoung Koo
,
Junbeom Hur
IEEE International Conference on Cloud Computing
2017
Corpus ID: 4723344
Secure deduplication using convergent encryption eliminates duplicate data and stores only one copy to save storage costs while…
Expand
2014
2014
Pairing-based cryptography for homomorphic cryptography
Y. Nogami
,
Shunsuke Miyoshi
International Symposium on Information Theory and…
2014
Corpus ID: 8356085
This paper introduces pairing-based cryptography focusing on homomorphic cryptography. Pairing is a bilinear map from two…
Expand
2013
2013
Aggregate Signature-Based Efficient Attributes Proof with Pairing-Based Anonymous Credential
Nan Guo
,
Jianju Cheng
,
Bin Zhang
,
Kangbin Yim
International Conference on Network-Based…
2013
Corpus ID: 15947559
We present a novel pairing-based anonymous credential in the random oracle model. To solve the linear complexity of attributes…
Expand
Review
2012
Review
2012
Pairing-Based Cryptography – Pairing 2012
Michel Abdalla
,
T. Lange
Lecture Notes in Computer Science
2012
Corpus ID: 6126090
This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012…
Expand
2011
2011
Fault attacks in pairing-based cryptography
Gennadij Liske
2011
Corpus ID: 2718917
Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen.
Highly Cited
2010
Highly Cited
2010
Private key agreement and secure communication for heterogeneous sensor networks
S. Rahman
,
K. El-Khatib
J. Parallel Distributed Comput.
2010
Corpus ID: 35774587
2010
2010
Designing a Code Generator for Pairing Based Cryptographic Functions
L. D. Perez
,
M. Scott
Pairing-Based Cryptography
2010
Corpus ID: 35292479
Pairing-Based Cryptography has become relevant in industry mainly because of the increasing interest in Identity-Based protocols…
Expand
2009
2009
A low-power pairing-based cryptographic accelerator for embedded security applications
T. English
,
Maurice Keller
,
K. L. Man
,
E. Popovici
,
M. Schellekens
,
W. Marnane
ACM Symposium on Cloud Computing
2009
Corpus ID: 7151341
We report on the implementation of an IP core for Pairing-based cryptography. The core performs an elliptic curve cryptographic…
Expand
2006
2006
Policy-based cryptography : theory and applications
Wohammed Walid Bagga
2006
Corpus ID: 62038900
xix
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE