Pairing-based cryptography has exploded over the last decade, as this algebraic setting offers good functionality and efficiency. However, there is a huge security gap between how schemes are usually analyzed in the academic literature and how they are typically implemented. The issue at play is that there exist multiple types of pairings: Type-I called “symmetric ” is typically how schemes are presented and proven secure in the literature, because it is simpler and the complexity assumptions can be weaker; however, Type-III called “asymmetric ” is typically the most efficient choice for an implementation in terms of bandwidth and computation time. There are two main complexities when moving from one pairing type to another. First, the chan...
International audienceBilinear pairings have been widely used in cryptographic protocols since they ...
Pairing-based cryptography has been employed to obtain several advantageous cryptographic protocols....
The security and performance of pairing based cryptography has provoked a large volume of research, ...
We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and T...
AbstractAsymmetric pairings e:G1×G2→GT for which an efficiently-computable isomorphism ψ:G2→G1 is kn...
AbstractMany research papers in pairing-based cryptography treat pairings as a “black box”. These pa...
Abstract. We propose a simple algorithm to select group generators suitable for pairing-based crypto...
International audienceWe address the question of how a computationally limited device may outsource ...
Abstract. The security and performance of pairing based cryptography has provoked a large volume of ...
The most powerful known primitive in public-key cryptography is undoubtedly elliptic curve pairings....
pairing implementation, high-security pairings, hyperelliptic curves, group law, Jacobian arithmetic...
International audienceThis study reports on an implementation of cryptographic pairings in a general...
Abstract. In this paper we examine the hard problems underlying asymmetric pairings, their precise r...
Many research papers in pairing based cryptography treat pairings as a ``black box\u27\u27. These pa...
Composite order pairing setting has been used to achieve cryptographic functionalities beyond what i...
International audienceBilinear pairings have been widely used in cryptographic protocols since they ...
Pairing-based cryptography has been employed to obtain several advantageous cryptographic protocols....
The security and performance of pairing based cryptography has provoked a large volume of research, ...
We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and T...
AbstractAsymmetric pairings e:G1×G2→GT for which an efficiently-computable isomorphism ψ:G2→G1 is kn...
AbstractMany research papers in pairing-based cryptography treat pairings as a “black box”. These pa...
Abstract. We propose a simple algorithm to select group generators suitable for pairing-based crypto...
International audienceWe address the question of how a computationally limited device may outsource ...
Abstract. The security and performance of pairing based cryptography has provoked a large volume of ...
The most powerful known primitive in public-key cryptography is undoubtedly elliptic curve pairings....
pairing implementation, high-security pairings, hyperelliptic curves, group law, Jacobian arithmetic...
International audienceThis study reports on an implementation of cryptographic pairings in a general...
Abstract. In this paper we examine the hard problems underlying asymmetric pairings, their precise r...
Many research papers in pairing based cryptography treat pairings as a ``black box\u27\u27. These pa...
Composite order pairing setting has been used to achieve cryptographic functionalities beyond what i...
International audienceBilinear pairings have been widely used in cryptographic protocols since they ...
Pairing-based cryptography has been employed to obtain several advantageous cryptographic protocols....
The security and performance of pairing based cryptography has provoked a large volume of research, ...