Pairing-Based Cryptographic Protocols : A Survey.

作者: Rana Barua , Palash Sarkar , Ratna Dutta

DOI:

关键词:

摘要: The bilinear pairing such as Weil or Tate on elliptic and hyperelliptic curves have recently been found applications in design of cryptographic protocols. In this survey, we tried to cover different protocols based pairings which possess, the best our knowledge, proper security proofs existing models.

参考文章(38)
Reihaneh Safavi-Naini, Willy Susilo, Fangguo Zhang, ID-Based Chameleon Hashes from Bilinear Pairings. IACR Cryptology ePrint Archive. ,vol. 2003, pp. 208- ,(2003)
Willy Susilo, Yi Mu, Non-interactive deniable ring authentication international conference on information security and cryptology. pp. 386- 401 ,(2003) , 10.1007/978-3-540-24691-6_29
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo, Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings international conference on cryptology in india. pp. 191- 204 ,(2003) , 10.1007/978-3-540-24582-7_14
Dan Boneh, Ilya Mironov, Victor Shoup, A Secure Signature Scheme from Bilinear Maps Topics in Cryptology — CT-RSA 2003. ,vol. 2612, pp. 98- 110 ,(2003) , 10.1007/3-540-36563-X_7
Rana Barua, Ratna Dutta, Palash Sarkar, Extending Joux’s Protocol to Multi Party Key Agreement international conference on cryptology in india. pp. 205- 217 ,(2003) , 10.1007/978-3-540-24582-7_15
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo, An Efficient Signature Scheme from Bilinear Pairings and Its Applications public key cryptography. pp. 277- 290 ,(2004) , 10.1007/978-3-540-24632-9_20
Steven D. Galbraith, Keith Harrison, David Soldera, Implementing the Tate Pairing algorithmic number theory symposium. pp. 324- 337 ,(2002) , 10.1007/3-540-45455-1_26
Antoine Joux, A One Round Protocol for Tripartite Diffie-Hellman algorithmic number theory symposium. ,vol. 1838, pp. 385- 394 ,(2000) , 10.1007/10722028_23
Claus Peter Schnorr, Security of Blind Discrete Log Signatures against Interactive Attacks international conference on information and communication security. pp. 1- 12 ,(2001) , 10.1007/3-540-45600-7_1
Anna Lysyanskaya, Unique Signatures and Verifiable Random Functions from the DH-DDH Separation international cryptology conference. pp. 597- 612 ,(2002) , 10.1007/3-540-45708-9_38