Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,666,980 papers from all fields of science
Search
Sign In
Create Free Account
Pairing-based cryptography
Pairing-based cryptography is the use of a pairing between elements of two cryptographic groups to a third group with a mapping to construct or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Cryptosystem
Decision Linear assumption
Decisional Diffie–Hellman assumption
Diffie–Hellman problem
Expand
Broader (1)
Elliptic curve cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Pairing-based cryptography for homomorphic cryptography
Y. Nogami
,
Shunsuke Miyoshi
International Symposium on Information Theory and…
2014
Corpus ID: 8356085
This paper introduces pairing-based cryptography focusing on homomorphic cryptography. Pairing is a bilinear map from two…
Expand
2014
2014
Implementing Pairing-Based Cryptosystems in USB Tokens
Zhaohui Cheng
IACR Cryptology ePrint Archive
2014
Corpus ID: 18424785
In the last decade, pairing-based cryptography has been one of the most intensively studied subjects in cryptography. Various…
Expand
Review
2012
Review
2012
Pairing-Based Cryptography – Pairing 2012
Michel Abdalla
,
T. Lange
Lecture Notes in Computer Science
2012
Corpus ID: 6126090
This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012…
Expand
2011
2011
AMY: A simple and secure way to connect devices using pairing-based cryptography
Wook Shin
,
Kazuhide Fukushima
,
S. Kiyomoto
,
Toshiaki Tanaka
IEEE International Conference on Consumer…
2011
Corpus ID: 28201227
We present the design of an apparatus that creates a personal private communication channel over computer-embedded devices. The…
Expand
Highly Cited
2010
Highly Cited
2010
Private key agreement and secure communication for heterogeneous sensor networks
S. Rahman
,
K. El-Khatib
J. Parallel Distributed Comput.
2010
Corpus ID: 35774587
2010
2010
Designing a Code Generator for Pairing Based Cryptographic Functions
L. D. Perez
,
M. Scott
Pairing-Based Cryptography
2010
Corpus ID: 35292479
Pairing-Based Cryptography has become relevant in industry mainly because of the increasing interest in Identity-Based protocols…
Expand
2010
2010
Secure Time Synchronization for Wireless Sensor Networks Based on Bilinear Pairing Functions
Mizanur Rahman
,
K. El-Khatib
IEEE Transactions on Parallel and Distributed…
2010
Corpus ID: 61645345
Time synchronization is crucial for wireless sensor networks (WSNs) and secure time synchronization is a key requirement for many…
Expand
2009
2009
A low-power pairing-based cryptographic accelerator for embedded security applications
T. English
,
Maurice Keller
,
K. L. Man
,
E. Popovici
,
M. Schellekens
,
W. Marnane
ACM Symposium on Cloud Computing
2009
Corpus ID: 7151341
We report on the implementation of an IP core for Pairing-based cryptography. The core performs an elliptic curve cryptographic…
Expand
2006
2006
Policy-based cryptography : theory and applications
Wohammed Walid Bagga
2006
Corpus ID: 62038900
xix
2005
2005
Scaling security in pairing-based protocols
M. Scott
IACR Cryptology ePrint Archive
2005
Corpus ID: 7369946
In number theoretic cryptography there is always the problem of scaling-up security to a higher level. This usually means…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE