Pairings for cryptographers

From MaRDI portal
Publication:1003698

DOI10.1016/j.dam.2007.12.010zbMath1156.94347OpenAlexW2026892462WikidataQ29541701 ScholiaQ29541701MaRDI QIDQ1003698

Steven D. Galbraith, Nigel P. Smart, Kenneth G. Paterson

Publication date: 4 March 2009

Published in: Discrete Applied Mathematics (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.dam.2007.12.010




Related Items

EPID with malicious revocationMulti-party revocation in sovrin: performance through distributed trustOptimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic CurvesStructure-preserving signatures and commitments to group elementsPredicate encryption supporting disjunctions, polynomial equations, and inner productsShort Integrated PKE+PEKS in Standard ModelObliviousDB: Practical and Efficient Searchable Encryption with Controllable LeakageProvably secure and pairing-based strong designated verifier signature scheme with message recoveryA reduction of security notions in designated confirmer signaturesConstant-size structure-preserving signatures: generic constructions and simple assumptionsA Leakage Resilient MACSelectively linkable group signatures -- stronger security and preserved verifiabilitySkipping the \(q\) in group signaturesDynamic universal accumulator with batch update over bilinear groupsSubversion-resilient enhanced privacy IDConstant Size Ring Signature Without Random OracleMore efficient structure-preserving signatures -- or: bypassing the type-III lower boundsAnonymous single-sign-on for \(n\) designated services with traceabilityEfficient revocable identity-based encryption with short public parametersRerandomizable signatures under standard assumptionSubgroup Security in Pairing-Based CryptographyEfficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed TraceabilityBatch verification of short signaturesIdentity-based encryption with hierarchical key-insulation in the standard modelEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionPublic Key Encryption with Flexible Pattern MatchingCompressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold SignaturesKCI-resilient anonymous wireless link-layer authentication protocolsExtendable threshold ring signatures with enhanced anonymityEfficient and universally composable single secret leader election from pairingsSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceA practical compiler for attribute-based encryption: new decentralized constructions and moreDFE-IP: delegatable functional encryption for inner productKeyword-Based Delegable Proofs of StorageWitness encryption from smooth projective hashing systemYou can sign but not decrypt: hierarchical integrated encryption and signaturePointcheval-Sanders signature-based synchronized aggregate signatureHierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)Smooth zero-knowledge hash functionsAttribute-based anonymous credential: optimization for single-use and multi-useZero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomialsCertificateless public key encryption with equality testNon-interactive multisignatures in the plain public-key model with efficient verificationImproved hidden vector encryption with short ciphertexts and tokensCryptographic group actions and applicationsPractical dynamic group signatures without knowledge extractorsAcyclicity programming for sigma-protocolsDory: efficient, transparent arguments for generalised inner products and polynomial commitmentsVerifiable functional encryption using Intel SGXNew Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public ParametersUnnamed ItemOn the impossibility of structure-preserving deterministic primitivesEfficient selective identity-based encryption without random oraclesEfficient algorithms for secure outsourcing of bilinear pairingsA Signature Scheme with Efficient Proof of ValidityAn efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control systemPublic-Key Encryption with Delegated SearchTagged One-Time Signatures: Tight Security and Optimal Tag SizeSequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation StudiesEfficient Self-pairing on Ordinary Elliptic CurvesCut Down the Tree to Achieve Constant Complexity in Divisible E-cashComparing two pairing-based aggregate signature schemesFully collusion-resistant traitor tracing scheme with shorter ciphertextsA taxonomy of pairing-friendly elliptic curvesOn cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisitedEfficient Protocols for Set Membership and Range ProofsPairings in Trusted ComputingStronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient ConstructionsConverting pairing-based cryptosystems from composite to prime order setting -- a comparative analysisScalable Divisible E-cashDiscrete logarithm problems with auxiliary inputsOn subversion-resistant SNARKsOn the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groupsMatch me if you can: matchmaking encryption and its applicationsEfficient Fully-Simulatable Oblivious TransferForgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanismEfficient redactable signature and application to anonymous credentialsAggregatable distributed key generationOffline Witness EncryptionBoneh-Boyen Signatures and the Strong Diffie-Hellman ProblemImproving revocation for group signature with redactable signatureGroup signatures with user-controlled and sequential linkabilityIdentity-based authenticated encryption with identity confidentialityA new approach to practical function-private inner product encryptionEfficient fully structure-preserving signatures and shrinking commitmentsParallelizing the Weil and Tate PairingsOn the Efficient Implementation of Pairing-Based ProtocolsDesignated Confirmer Signatures with Unified VerificationStill wrong use of pairings in cryptographyAn Efficient Self-blindable Attribute-Based Credential SchemeEfficient Round-Optimal Blind Signatures in the Standard ModelPractical (fully) distributed signatures provably secure in the standard modelPartially structure-preserving signatures: lower bounds, constructions and moreAn efficient certificate-based signature scheme in the standard model



Cites Work


This page was built for publication: Pairings for cryptographers