Back to Results
First PageMeta Content
Public-key cryptography / Finite fields / BLS / Computational Diffie–Hellman assumption / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Diffie–Hellman key exchange / Zero-knowledge proof / Digital signature / Cryptography / Computational hardness assumptions / Cryptographic protocols


Pairing-Based Identification Schemes
Add to Reading List

Document Date: 2008-06-06 19:27:43


Open Document

File Size: 286,10 KB

Share Result on Facebook

City

Palo Alto / Pairing / /

Company

Fiat / HP Labs / Hewlett-Packard Development Company L.P. / /

Event

FDA Phase / /

IndustryTerm

probabilistic polynomial-time algorithm / digital signature algorithm / polynomial-time algorithm / signature algorithm / /

Organization

Malice / /

Person

David Freeman / Peggy / Victor / Kim / Vinay Deolalikar / /

Position

Private / /

Product

G1 / /

ProvinceOrState

Saskatchewan / /

Technology

cryptography / randomized algorithm / public key / Diffie-Hellman assumption Protocol / polynomial-time algorithm / signature algorithm / SDH / private key / secret key / probabilistic polynomial-time algorithm / digital signature / assumption Protocol / key-generation algorithm / digital signature algorithm / interactive protocol / /

SocialTag