In our day to day life, information security is a predominant topic. More specifically, (online) users expect to be asked for consent and that service providers handle their personal data with care and integrity. This urges the design of systems enforcing such expectations. The field of cryptography provides such powerful privacy-preserving tools. In this thesis, we consider one of those tools: pairings over elliptic curves. We strongly diverge from the general approach, i.e. taking already standardized curves regardless of the cryptographic protocol, and suggest curves satisfying chosen criteria. The given curves in this thesis have more efficient operations in the first pairing group than the curves from the literature. We follow by givin...