Back to Results
First PageMeta Content
Pairing / Boneh/Franklin scheme / Elliptic curve cryptography / Diffie–Hellman problem / Elliptic curve / ID-based encryption / Tate pairing / BLS / Supersingular elliptic curve / Cryptography / Abstract algebra / Algebra


An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and
Add to Reading List

Document Date: 2013-10-27 06:53:30


Open Document

File Size: 236,64 KB

Share Result on Facebook

City

an introduction to pairing / introduction to pairing / Pairing / /

Company

G1 / /

Event

FDA Phase / /

IndustryTerm

cryptographic protocols / multiplicatively-written / subexponential-time index-calculus algorithms / important applications / log protocols / indispensable tool / generic algorithm / fundamental pairing-based protocols / computing / certificate-based systems / agreement protocol / identity-based and certificate-based systems / additively-written / ingenious protocols / /

Organization

Bob / /

Person

Alfred Menezes / Bob / Alice / Ai / Chris / /

Position

mP / protocol designer / /

Product

Cowon D2+ Portable Audio Device / Franklin / G1l / /

ProvinceOrState

California / /

Technology

encryption / pairing-based protocols / l-party one-round protocol / Cryptography / log protocols / public key / three fundamental pairing-based protocols / 1 2 ALFRED MENEZES The Diffie-Hellman protocol / key agreement protocol / known subexponential-time index-calculus algorithms / identity-based encryption / three-party one-round key agreement protocol / private key / DLP / two-round protocol / using public-key encryption / one-round protocol / DiffieHellman key agreement protocol / Two-party one-round key agreement protocol / Three-party two-round key agreement protocol / /

SocialTag