<--- Back to Details
First PageDocument Content
Public-key cryptography / Finite fields / BLS / Computational Diffie–Hellman assumption / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Diffie–Hellman key exchange / Zero-knowledge proof / Digital signature / Cryptography / Computational hardness assumptions / Cryptographic protocols
Date: 2008-06-06 19:27:43
Public-key cryptography
Finite fields
BLS
Computational Diffie–Hellman assumption
Diffie–Hellman problem
Decisional Diffie–Hellman assumption
Diffie–Hellman key exchange
Zero-knowledge proof
Digital signature
Cryptography
Computational hardness assumptions
Cryptographic protocols

Pairing-Based Identification Schemes

Add to Reading List

Source URL: theory.stanford.edu

Download Document from Source Website

File Size: 286,10 KB

Share Document on Facebook

Similar Documents

Abstract algebra / Algebra / Cryptography / Finite fields / Group theory / Logarithms / Computational hardness assumptions / Binary operations / Discrete logarithm / Elliptic curve cryptography / Prime number / Elliptic curve

Computing discrete logarithms in fields of small characteristic Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN Joint work with:

DocID: 1r2Hf - View Document

Abstract algebra / Algebra / Group theory / Mathematics / Logarithms / Computational hardness assumptions / Finite fields / Modular arithmetic / Index calculus algorithm / Discrete logarithm / Baby-step giant-step / Elliptic curve

Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

DocID: 1qjra - View Document

Computational complexity theory / Theory of computation / Complexity classes / Approximation algorithms / Computational hardness assumptions / Polynomial-time approximation scheme / Time complexity / NC / Reduction / Exponential time hypothesis / NP-hardness / NP

Approximating the least hypervolume contributor: NP-hard in general, but fast in practice Karl Bringmann1 and Tobias Friedrich2 1

DocID: 1q2Qr - View Document

Cryptography / Integer factorization algorithms / Computational hardness assumptions / E-commerce / RSA / Quadratic sieve / Lattice / Integer factorization

Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint ∗ Alexander May, Maike Ritzenhofen Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum, 44780 Bochum, Ger

DocID: 1pMu4 - View Document

Cryptography / Finite fields / Computational hardness assumptions / Password-authenticated key agreement / Password Authenticated Key Exchange by Juggling / SPEKE / DiffieHellman problem / Zero-knowledge proof / XTR / Digital signature / Proof of knowledge

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

DocID: 1mJoe - View Document