It was recently discovered by Joux [30] and Sakai, Ohgishi and Kasahara [47] that bilinear maps could be used to construct cryptographic schemes. Since then, bilinear maps have been used in applications as varied as identity-based encryption, short signatures and one-round tripartite key agreement. This thesis explains the notion of bilinear maps and surveys the applications of bilinear maps in the three main fields of cryptography: encryption, signature and key agreement. We also show how these maps can be constructed using the Weil and Tate pairings in elliptic curves
Elliptic curves have a rich algebraic structure which can, in fact, be used in applications to crypt...
We proposed an efficient and secure digital signature scheme using elliptic curve cryptography (ECC)...
Abstract. The first short signature scheme is proposed by Boneh, Lynn, and Shacham (BLS) in [8]. Thi...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
Bilinear maps have become an important new item in the cryptographer’s toolkit. They first came to p...
Bilinear maps have become an important new item in the cryptographer’s toolkit. They first came to p...
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced D...
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced D...
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced D...
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced D...
This report contains an overview of two related areas of research in cryptography which have been p...
We give an elementary and self-contained introduction to pairings on elliptic curves over finite fie...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
Part 5: Protocols and AlgorithmsInternational audienceWith the rapid advancements in innovative tech...
Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round...
Elliptic curves have a rich algebraic structure which can, in fact, be used in applications to crypt...
We proposed an efficient and secure digital signature scheme using elliptic curve cryptography (ECC)...
Abstract. The first short signature scheme is proposed by Boneh, Lynn, and Shacham (BLS) in [8]. Thi...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
Bilinear maps have become an important new item in the cryptographer’s toolkit. They first came to p...
Bilinear maps have become an important new item in the cryptographer’s toolkit. They first came to p...
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced D...
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced D...
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced D...
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced D...
This report contains an overview of two related areas of research in cryptography which have been p...
We give an elementary and self-contained introduction to pairings on elliptic curves over finite fie...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
Part 5: Protocols and AlgorithmsInternational audienceWith the rapid advancements in innovative tech...
Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round...
Elliptic curves have a rich algebraic structure which can, in fact, be used in applications to crypt...
We proposed an efficient and secure digital signature scheme using elliptic curve cryptography (ECC)...
Abstract. The first short signature scheme is proposed by Boneh, Lynn, and Shacham (BLS) in [8]. Thi...