Academic literature on the topic 'Bilinear pairing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Bilinear pairing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Bilinear pairing"

1

Luc, Nhu-Quynh, Quang-Trung Do, and Manh-Hung Le. "Implementation of Boneh - Lynn - Shacham short digital signature scheme using Weil bilinear pairing based on supersingular elliptic curves." Ministry of Science and Technology, Vietnam 64, no. 12 (2022): 3–9. http://dx.doi.org/10.31276/vjste.64(4).03-09.

Full text
Abstract:
One option for a digital signature solution for devices with low memory and low bandwidth transmission over channels uses a short digital signature scheme based on Weil bilinear pairing aimed at short processing times, fast computation, and convenient deployment on applications. The computational technique of non-degenerate bilinear pairings uses supersingular elliptic curves over a finite field Fpl (where p is a sufficiently large prime number) and has the advantage of being able to avoid Weil-descent, Menezes-Okamoto-Vanstone (MOV) attacks, and attacks by the Number Field Sieve algorithm. Co
APA, Harvard, Vancouver, ISO, and other styles
2

Ying, Qing. "Bilinear Pairings: A Secured Outsourcing with a Single Server." Asian Journal of Mathematics and Computer Research 31, no. 2 (2024): 87–95. http://dx.doi.org/10.56557/ajomcor/2024/v31i28681.

Full text
Abstract:
The computation of bilinear pairs is the most computationally expensive computation for bilinear pair-based cryptographic protocols in practice. Currently, most bilinear pairing outsourcing algorithms have little checkability, or the outsourcer requires two servers for expensive calculations. In this paper, we propose an efficient and secure single-server bilinear pairing outsourcing algorithm, which allows the outsourcing party to detect dishonest errors in cloud servers with probability 1, and the outsourcing party does not need to perform some complex computations.
APA, Harvard, Vancouver, ISO, and other styles
3

DU, Xin-Jun. "Chameleon Signature from Bilinear Pairing." Journal of Software 18, no. 10 (2007): 2662. http://dx.doi.org/10.1360/jos182662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

DONG, GUOFAGN, FEI GAO, WENBO SHI, and PENG GONG. "An efficient certificateless blind signature scheme without bilinear pairing." Anais da Academia Brasileira de Ciências 86, no. 2 (2014): 1003–11. http://dx.doi.org/10.1590/0001-3765201420130199.

Full text
Abstract:
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public key cryptography (ID-based PKC). To satisfy requirements of different applications, many certificateless blind signature (CLBS) schemes using bilinear pairing for the CLPKC setting have been proposed. However, the bilinear pairing operation is very complicated. Therefore, the performance of those CLBS schemes is not very satisfactory. To solve th
APA, Harvard, Vancouver, ISO, and other styles
5

Gao, Ronghai, Jiwen Zeng, and Lunzhi Deng. "Efficient Certificateless Anonymous Multi-Receiver Encryption Scheme without Bilinear Parings." Mathematical Problems in Engineering 2018 (July 24, 2018): 1–13. http://dx.doi.org/10.1155/2018/1486437.

Full text
Abstract:
With the growing development of Internet technology and popularization of mobile devices, we easily access the Internet anytime and anywhere by mobile devices. It has brought great convenience for our lives. But it brought more challenges than traditional wired communication, such as confidentiality and privacy. In order to improve security and privacy protection in using mobile network, numerous multi-receiver identity-based encryption schemes have been proposed with bilinear pairing and probabilistic hap-to-point (HTP) function. To address the troubles of private key escrow in multi-receiver
APA, Harvard, Vancouver, ISO, and other styles
6

LIU, Wen-Hao, and Chun-Xiang XU. "Certificateless Signcryption Scheme Without Bilinear Pairing." Journal of Software 22, no. 8 (2011): 1918–26. http://dx.doi.org/10.3724/sp.j.1001.2011.03891.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Somberg, Petr. "Invariant Bilinear Pairing for Twistor Spinors." Advances in Applied Clifford Algebras 19, no. 3-4 (2009): 947–57. http://dx.doi.org/10.1007/s00006-009-0195-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Jian Hong, Hua Chen, and Yi Xian Yang. "Efficient Blind Signature Scheme Based on Modified Generalized Bilinear Inversion." Key Engineering Materials 439-440 (June 2010): 1265–70. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.1265.

Full text
Abstract:
As a special anonymous signature, the blindness of blind signatures makes it play an important role in electronic commerce. In this paper we first propose a novel blind signature scheme from bilinear pairings. Furthermore, we also give a formal proof of security for the proposed schemes in the random oracle model. And we show that the scheme satisfies the two properties of blind signature: blindness and unforgeability. As for efficiency of the scheme, the size of our blind signature is 320 bits, and no pairings operator are required in the blind signing phas and two pairing operators are neede
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Wenhao, Qi Xie, Shengbao Wang, Lidong Han, and Bin Hu. "Pairing-Free Certificateless Signature with Security Proof." Journal of Computer Networks and Communications 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/792063.

Full text
Abstract:
Since certificateless public key cryptosystem can solve the complex certificate management problem in the traditional public key cryptosystem and the key escrow problem in identity-based cryptosystem and the pairing computation is slower than scalar multiplication over the elliptic curve, how to design certificateless signature (CLS) scheme without bilinear pairings is a challenge. In this paper, we first propose a new pairing-free CLS scheme, and then the security proof is presented in the random oracle model (ROM) under the discrete logarithm assumption. The proposed scheme is more efficient
APA, Harvard, Vancouver, ISO, and other styles
10

Ren, Yanli, Min Dong, Zhihua Niu, and Xiaoni Du. "Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/4892814.

Full text
Abstract:
It is well known that the computation of bilinear pairing is the most expensive operation in pairing-based cryptography. In this paper, we propose a noninteractive verifiable outsourcing algorithm of bilinear pairing based on two servers in the one-malicious model. The outsourcer need not execute any expensive operation, such as scalar multiplication and modular exponentiation. Moreover, the outsourcer could detect any failure with a probability close to 1 if one of the servers misbehaves. Therefore, the proposed algorithm improves checkability and decreases communication cost compared with th
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Bilinear pairing"

1

Gagne, Martin. "Applications of Bilinear Maps in Cryptography." Thesis, University of Waterloo, 2002. http://hdl.handle.net/10012/1134.

Full text
Abstract:
It was recently discovered by Joux [30] and Sakai, Ohgishi and Kasahara [47] that bilinear maps could be used to construct cryptographic schemes. Since then, bilinear maps have been used in applications as varied as identity-based encryption, short signatures and one-round tripartite key agreement. This thesis explains the notion of bilinear maps and surveys the applications of bilinear maps in the three main fields of cryptography: encryption, signature and key agreement. We also show how these maps can be constructed using the Weil and Tate pairings in elliptic curves.
APA, Harvard, Vancouver, ISO, and other styles
2

Alanazi, Faisal. "Secure Ecient Identity-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Status Message Broadcasting without Bilinear Pairing." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1531779812827079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Varga, Ondrej. "Efektivní schémata digitálních podpisů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219303.

Full text
Abstract:
Digital signatures, which take the properties of classical signatures, are used to secure the actual content of documents, which can be modified during transmission over an insecure channel. The problems of security and protection of communicating participants are solved by cryptographic techniques. Identity verification, message integrity, credibility, the ownership of documents, and the secure transmission of information over an unsecured channel, are all dealt with in secure communications - Public Key Infrastructure, which uses digital signatures. Nowadays digital signatures are often used
APA, Harvard, Vancouver, ISO, and other styles
4

Sangalli, Leandro Aparecido 1988. "Avaliação do custo computacional de emparelhamentos bilineares sobre curvas elípticas Barreto-Naehrig." [s.n.], 2014. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259577.

Full text
Abstract:
Orientador: Marco Aurélio Amaral Henriques<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação<br>Made available in DSpace on 2018-08-26T04:02:15Z (GMT). No. of bitstreams: 1 Sangalli_LeandroAparecido1988-_M.pdf: 2889538 bytes, checksum: 474d1ae695fc20d0f0b214ac8ba4716f (MD5) Previous issue date: 2014<br>Resumo: Emparelhamentos bilineares sobre curvas elípticas são funções matemáticas que podem viabilizar protocolos criptográficos promissores. Porém, um fato que enfraquece o desenvolvimento destes protocolos é o alto custo computaci
APA, Harvard, Vancouver, ISO, and other styles
5

Malina, Lukáš. "Kryptografické protokoly s ochranou soukromí pro zabezpečení heterogenních sítí." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-233671.

Full text
Abstract:
Disertační práce se zabývá kryptografickými protokoly poskytující ochranu soukromí, které jsou určeny pro zabezpečení komunikačních a informačních systémů tvořících heterogenní sítě. Práce se zaměřuje především na možnosti využití nekonvenčních kryptografických prostředků, které poskytují rozšířené bezpečnostní požadavky, jako je například ochrana soukromí uživatelů komunikačního systému. V práci je stanovena výpočetní náročnost kryptografických a matematických primitiv na různých zařízeních, které se podílí na zabezpečení heterogenní sítě. Hlavní cíle práce se zaměřují na návrh pokročilých kr
APA, Harvard, Vancouver, ISO, and other styles
6

Goya, Denise Hideko. ""Proposta de esquemas de criptografia e de assinatura sob modelo de criptografia de chave pública sem certificado"." Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-28072006-142410/.

Full text
Abstract:
Sob o modelo de criptografia de chave pública baseada em identidades (ID-PKC), a própria identidade dos usuários é usada como chave pública, de modo a dispensar a necessidade de uma infra-estrutura de chaves públicas (ICP), na qual o gerenciamento de certificados digitais é complexo. Por outro lado, sistemas nesse modelo requerem uma entidade capaz de gerar chaves secretas. Essa entidade é conhecida por PKG (Private Key Generator); ela possui uma chave-mestra e mantém custódia das chaves secretas geradas a partir dessa chave-mestra. Naturalmente, a custódia de chaves é indesejável em muitas ap
APA, Harvard, Vancouver, ISO, and other styles
7

Araujo, Rafael Will Macedo de. "Autenticação e comunicação segura em dispositivos móveis de poder computacional restrito." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-18122013-014306/.

Full text
Abstract:
Protocolos de autenticação e de estabelecimento de chaves são peças fundamentais em implementações de segurança para comunicação de dispositivos eletrônicos. Em aplicações que envolvam dispositivos com poder computacional restrito (tais como smartphones ou tablets) comunicando-se com um servidor, é primordial a escolha de protocolos eficientes e que necessitem de uma infraestrutura mais simples. Neste trabalho selecionamos e implementamos protocolos de acordo de chave seguros nos modelos de criptografia de chave pública baseado em identidade (ID-based) e sem certificado (Certificateless) em pl
APA, Harvard, Vancouver, ISO, and other styles
8

Mailloux, Nicholas J. "Group key agreement from bilinear pairings." Thesis, University of Ottawa (Canada), 2009. http://hdl.handle.net/10393/28296.

Full text
Abstract:
The use of bilinear pairings as a building block for cryptographic protocols, most notably in the construction of identity-based cryptosystems, is a very popular area of cryptographic research. In this thesis, we provide a novel classification of pairing-based group key agreement (GKA) from current literature. We propose a new framework for constructing secure and efficient computationally asymmetric authenticated GKA protocols from identity-based signcryption schemes and adapt this framework to construct a novel identity-based authenticated GKA protocol with perfect forward secrecy. To the be
APA, Harvard, Vancouver, ISO, and other styles
9

Chow, Sze-ming Sherman. "Forward security from bilinear pairings signcryption and threshold signature /." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B30679424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chow, Sze-ming Sherman, and 周斯明. "Forward security from bilinear pairings: signcryption and threshold signature." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30679424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Bilinear pairing"

1

Pu, Shi, and Jyh-Charn Liu. "EAGL: An Elliptic Curve Arithmetic GPU-Based Library for Bilinear Pairing." In Pairing-Based Cryptography – Pairing 2013. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04873-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fuchsbauer, Georg, and David Pointcheval. "Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures." In Pairing-Based Cryptography – Pairing 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03298-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Leyou, Yupu Hu, and Qing Wu. "Short Signature from the Bilinear Pairing." In Information Computing and Applications. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16167-4_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cheng, Xiangguo, Huafei Zhu, Ying Qiu, and Xinmei Wang. "Efficient Group Signatures from Bilinear Pairing." In Information Security and Cryptology. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599548_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rasslan, Mohamed, and Amr Youssef. "A Bilinear Pairing Based Hidden-Signature Scheme." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14171-3_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yoneyama, Kazuki. "Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols." In Provable Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12475-9_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vallent, Thokozani Felix, and Hyunsung Kim. "Three Factor Authentication Protocol Based on Bilinear Pairing." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6738-6_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xiong, Hao, Xiaoqi Yu, Yi-Jun He, and Siu Ming Yiu. "Improved Composite Order Bilinear Pairing on Graphics Hardware." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6738-6_90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Chunbo, and Dake He. "A New Chameleon Multi-signature Based on Bilinear Pairing." In Grid and Cooperative Computing - GCC 2004 Workshops. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30207-0_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Ye, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, and Siu Ming Yiu. "Acceleration of Composite Order Bilinear Pairing on Graphics Hardware." In Information and Communications Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Bilinear pairing"

1

Zhen, Hong-hu, and Yue Chen. "Bilinear Pairing Based DAA Protocol." In 2009 International Conference on Computational Intelligence and Natural Computing (CINC). IEEE, 2009. http://dx.doi.org/10.1109/cinc.2009.116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tang, Peng-zhi, Qing-lan Zhang, and Jun-fang Yang. "Certificateless signcryption scheme based on bilinear pairing." In 2015 2nd International Conference on Wireless Communication and Sensor Network (WCSN 2015). WORLD SCIENTIFIC, 2016. http://dx.doi.org/10.1142/9789813140011_0046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Mingwen, Zhiyuan Ren, Jun Cai, and Wentao Zheng. "A biometric signcryption scheme without bilinear pairing." In 2012 International Conference on Graphic and Image Processing, edited by Zeng Zhu. SPIE, 2013. http://dx.doi.org/10.1117/12.2002003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cui, Li, Bai Yun, Shi Lin, and Bai Wenhua. "A New Certificateless Signcryption Scheme Without Bilinear Pairing." In 2018 13th International Conference on Computer Science & Education (ICCSE). IEEE, 2018. http://dx.doi.org/10.1109/iccse.2018.8468859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation." In 1st International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005273002380245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yu, Rongwei, Lina Wang, Yanzhou Zhou, and Xianhui Niu. "An Optimized Anonymous Attestation Protocol from Bilinear Pairing." In 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing. IEEE, 2009. http://dx.doi.org/10.1109/embeddedcom-scalcom.2009.82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Chih-Hsun, and Chia-Mu Yu. "Privacy-Preserving Record Linkage via Bilinear Pairing Approach." In 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW). IEEE, 2018. http://dx.doi.org/10.1109/icce-china.2018.8448454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Elsheh, Esam, and A. Ben Hmaza. "A group key agreement protocol using bilinear pairing." In 2008 Canadian Conference on Electrical and Computer Engineering - CCECE. IEEE, 2008. http://dx.doi.org/10.1109/ccece.2008.4564597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shen, Jun, Kai Wang, Zhong Lv, Jie Yu, Yue Cui, and Jianxue Zheng. "A Certificateless Aggregate Signature Scheme without Bilinear Pairing." In CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy. ACM, 2024. http://dx.doi.org/10.1145/3672919.3672935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karati, Arijit, and G. P. Biswas. "A practical identity based signcryption scheme from bilinear pairing." In 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2016. http://dx.doi.org/10.1109/icacci.2016.7732149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!