Adequate elliptic curves for computing the product of n pairings
From MaRDI portal
Publication:5267791
Recommendations
- Analysis of optimum pairing products at high security levels
- Efficient optimal ate pairing at 128-bit security level
- Improving the computation of the optimal ate pairing for a high security level
- Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level
- Implementing pairings at the 192-bit security level
Cites work
- scientific article; zbMATH DE number 1952905 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Adequate elliptic curves for computing the product of \(n\) pairings
- Advances in Cryptology – CRYPTO 2004
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Analysis of optimum pairing products at high security levels
- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Elliptic curves. Number theory and cryptography
- Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree
- Faster hashing to \({\mathbb G}_2\)
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Encryption Gone Wild
- Implementing pairings at the 192-bit security level
- On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves
- Pairing-Friendly Elliptic Curves of Prime Order
- Short signatures from the Weil pairing
- Subgroup security in pairing-based cryptography
- The Eta Pairing Revisited
- The Weil pairing, and its efficient calculation
- The history of the LLL-algorithm
- Topics in Cryptology – CT-RSA 2004
- Topics in Cryptology – CT-RSA 2005
Cited in
(8)- Hashing to elliptic curves of \(j\)-invariant 1728
- Updating key size estimations for pairings
- Analysis of optimum pairing products at high security levels
- Secure and Efficient Pairing at 256-Bit Security Level
- Subgroup security in pairing-based cryptography
- Beta Weil pairing revisited
- An improvement of optimal ate pairing on KSS curve with pseudo 12-sparse multiplication
- Adequate elliptic curves for computing the product of \(n\) pairings
This page was built for publication: Adequate elliptic curves for computing the product of \(n\) pairings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5267791)