International audienceIdentity Based Encryption is an approach to link the public key to an identity. It is an extremely useful asymmetric cryptography type in which public and private keys are computed from a known identifier such as an email address instead of being generated randomly. This allows more flexibility in managing ad-hoc public key encryption and ensuring secure communications. The aim of this work is to improve IBE scheme using the bilinear Tate pairing on genus two curves with ordinary Jacobian over large prime fields. We present a full description of functional IBE scheme using the optimization of the Tate pairing computations. The proposed application answers a question of Boneh and Franklin [2] about the possibility of us...
Pairings on elliptic curves recently obtained a lot of attention not only as a means to attack curve...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) ...
We generalize Boneh-Rubin-Silverberg method [3] to construct ordinary elliptic curves with embedding...
International audienceIdentity Based Encryption is an approach to link the public key to an identity...
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced D...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen cipherte...
Tate Pairings on Elliptic curve Cryptography are important because they can be used to build efficie...
Bilinear pairings have been recently used to construct cryptographic schemes with new and novel prop...
Abstract We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen...
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the ...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
La recherche de nouveaux groupes autres que le groupe multiplicatif pour concevoir des protocoles pl...
Abstract. In this paper we examine the hard problems underlying asymmetric pairings, their precise r...
Abstract. In this paper we examine the hard problems underlying asymmetric pairings, their precise r...
In recent papers [4], [9] they worked on hyperelliptic curves H b defined by y +y = x +x +b o...
Pairings on elliptic curves recently obtained a lot of attention not only as a means to attack curve...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) ...
We generalize Boneh-Rubin-Silverberg method [3] to construct ordinary elliptic curves with embedding...
International audienceIdentity Based Encryption is an approach to link the public key to an identity...
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced D...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen cipherte...
Tate Pairings on Elliptic curve Cryptography are important because they can be used to build efficie...
Bilinear pairings have been recently used to construct cryptographic schemes with new and novel prop...
Abstract We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen...
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the ...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
La recherche de nouveaux groupes autres que le groupe multiplicatif pour concevoir des protocoles pl...
Abstract. In this paper we examine the hard problems underlying asymmetric pairings, their precise r...
Abstract. In this paper we examine the hard problems underlying asymmetric pairings, their precise r...
In recent papers [4], [9] they worked on hyperelliptic curves H b defined by y +y = x +x +b o...
Pairings on elliptic curves recently obtained a lot of attention not only as a means to attack curve...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) ...
We generalize Boneh-Rubin-Silverberg method [3] to construct ordinary elliptic curves with embedding...