Batch Pairing Delegation

作者: Patrick P. Tsang , Sherman S. M. Chow , Sean W. Smith

DOI: 10.1007/978-3-540-75651-4_6

关键词: Computer scienceBroadcast encryptionDistributed computingDelegationBlind signatureCryptographic protocolTrusted ComputingRandom oraclePairingCryptography

摘要: Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as computing devices resource-constrained. Pairing delegation introduced in [19] provides a solution by offloading computation more powerful entities. In this paper, we introduce concept of, and construct several protocols for, batch pairing delegation, which offers significantly improved efficiency over multiple runs state-of-the-art (non-batch) We prove security our proposed model formalized for delegation. Also, have implemented software experimentation. Moreover, argue that secure computation, batched or not, requires different depending on semantic meaning pairings. propose taxonomy classifies pairings into seven types assist choosing right protocol. Finally, novel application trusted -- show how can be leveraged build coprocessor cost-effectively.

参考文章(44)
Melissa Chase, Anna Lysyanskaya, Simulatable VRFs with Applications to Multi-theorem NIZK Advances in Cryptology - CRYPTO 2007. pp. 303- 322 ,(2007) , 10.1007/978-3-540-74143-5_17
L. Chen, C. Kudla, Identity based authenticated key agreement protocols from pairings ieee computer security foundations symposium. pp. 219- 233 ,(2003) , 10.1109/CSFW.2003.1212715
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Sherman S. M. Chow, Verifiable Pairing and Its Applications Information Security Applications. pp. 170- 187 ,(2005) , 10.1007/978-3-540-31815-6_15
Michael Scott, Neil Costigan, Wesam Abdulwahab, Implementing cryptographic pairings on smartcards cryptographic hardware and embedded systems. pp. 134- 147 ,(2006) , 10.1007/11894063_11
Sherman S. M. Chow, Kim-Kwang Raymond Choo, Strongly-Secure Identity-Based Key Agreement and Anonymous Extension Lecture Notes in Computer Science. pp. 203- 220 ,(2007) , 10.1007/978-3-540-75496-1_14
Moon Sung Lee, Bo Gyeong Kang, Je Hong Park, Efficient Delegation of Pairing Computation. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 259- ,(2005)
Antoine Joux, A One Round Protocol for Tripartite Diffie-Hellman algorithmic number theory symposium. ,vol. 1838, pp. 385- 394 ,(2000) , 10.1007/10722028_23
Craig Gentry, Practical Identity-Based Encryption Without Random Oracles Advances in Cryptology - EUROCRYPT 2006. pp. 445- 464 ,(2006) , 10.1007/11761679_27
Kaoru Kurosawa, Swee-Huay Heng, The Power of Identification Schemes Public Key Cryptography - PKC 2006. pp. 364- 377 ,(2006) , 10.1007/11745853_24