Academic literature on the topic 'Bilinear pairing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Bilinear pairing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Bilinear pairing"
Luc, Nhu-Quynh, Quang-Trung Do, and Manh-Hung Le. "Implementation of Boneh - Lynn - Shacham short digital signature scheme using Weil bilinear pairing based on supersingular elliptic curves." Ministry of Science and Technology, Vietnam 64, no. 12 (2022): 3–9. http://dx.doi.org/10.31276/vjste.64(4).03-09.
Full textYing, Qing. "Bilinear Pairings: A Secured Outsourcing with a Single Server." Asian Journal of Mathematics and Computer Research 31, no. 2 (2024): 87–95. http://dx.doi.org/10.56557/ajomcor/2024/v31i28681.
Full textDU, Xin-Jun. "Chameleon Signature from Bilinear Pairing." Journal of Software 18, no. 10 (2007): 2662. http://dx.doi.org/10.1360/jos182662.
Full textDONG, GUOFAGN, FEI GAO, WENBO SHI, and PENG GONG. "An efficient certificateless blind signature scheme without bilinear pairing." Anais da Academia Brasileira de Ciências 86, no. 2 (2014): 1003–11. http://dx.doi.org/10.1590/0001-3765201420130199.
Full textGao, Ronghai, Jiwen Zeng, and Lunzhi Deng. "Efficient Certificateless Anonymous Multi-Receiver Encryption Scheme without Bilinear Parings." Mathematical Problems in Engineering 2018 (July 24, 2018): 1–13. http://dx.doi.org/10.1155/2018/1486437.
Full textLIU, Wen-Hao, and Chun-Xiang XU. "Certificateless Signcryption Scheme Without Bilinear Pairing." Journal of Software 22, no. 8 (2011): 1918–26. http://dx.doi.org/10.3724/sp.j.1001.2011.03891.
Full textSomberg, Petr. "Invariant Bilinear Pairing for Twistor Spinors." Advances in Applied Clifford Algebras 19, no. 3-4 (2009): 947–57. http://dx.doi.org/10.1007/s00006-009-0195-y.
Full textZhang, Jian Hong, Hua Chen, and Yi Xian Yang. "Efficient Blind Signature Scheme Based on Modified Generalized Bilinear Inversion." Key Engineering Materials 439-440 (June 2010): 1265–70. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.1265.
Full textLiu, Wenhao, Qi Xie, Shengbao Wang, Lidong Han, and Bin Hu. "Pairing-Free Certificateless Signature with Security Proof." Journal of Computer Networks and Communications 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/792063.
Full textRen, Yanli, Min Dong, Zhihua Niu, and Xiaoni Du. "Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/4892814.
Full textDissertations / Theses on the topic "Bilinear pairing"
Gagne, Martin. "Applications of Bilinear Maps in Cryptography." Thesis, University of Waterloo, 2002. http://hdl.handle.net/10012/1134.
Full textAlanazi, Faisal. "Secure Ecient Identity-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Status Message Broadcasting without Bilinear Pairing." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1531779812827079.
Full textVarga, Ondrej. "Efektivní schémata digitálních podpisů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219303.
Full textSangalli, Leandro Aparecido 1988. "Avaliação do custo computacional de emparelhamentos bilineares sobre curvas elípticas Barreto-Naehrig." [s.n.], 2014. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259577.
Full textMalina, Lukáš. "Kryptografické protokoly s ochranou soukromí pro zabezpečení heterogenních sítí." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-233671.
Full textGoya, Denise Hideko. ""Proposta de esquemas de criptografia e de assinatura sob modelo de criptografia de chave pública sem certificado"." Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-28072006-142410/.
Full textAraujo, Rafael Will Macedo de. "Autenticação e comunicação segura em dispositivos móveis de poder computacional restrito." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-18122013-014306/.
Full textMailloux, Nicholas J. "Group key agreement from bilinear pairings." Thesis, University of Ottawa (Canada), 2009. http://hdl.handle.net/10393/28296.
Full textChow, Sze-ming Sherman. "Forward security from bilinear pairings signcryption and threshold signature /." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B30679424.
Full textChow, Sze-ming Sherman, and 周斯明. "Forward security from bilinear pairings: signcryption and threshold signature." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30679424.
Full textBook chapters on the topic "Bilinear pairing"
Pu, Shi, and Jyh-Charn Liu. "EAGL: An Elliptic Curve Arithmetic GPU-Based Library for Bilinear Pairing." In Pairing-Based Cryptography – Pairing 2013. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04873-4_1.
Full textFuchsbauer, Georg, and David Pointcheval. "Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures." In Pairing-Based Cryptography – Pairing 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03298-1_10.
Full textZhang, Leyou, Yupu Hu, and Qing Wu. "Short Signature from the Bilinear Pairing." In Information Computing and Applications. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16167-4_15.
Full textCheng, Xiangguo, Huafei Zhu, Ying Qiu, and Xinmei Wang. "Efficient Group Signatures from Bilinear Pairing." In Information Security and Cryptology. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599548_11.
Full textRasslan, Mohamed, and Amr Youssef. "A Bilinear Pairing Based Hidden-Signature Scheme." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14171-3_34.
Full textYoneyama, Kazuki. "Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols." In Provable Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12475-9_23.
Full textVallent, Thokozani Felix, and Hyunsung Kim. "Three Factor Authentication Protocol Based on Bilinear Pairing." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6738-6_32.
Full textXiong, Hao, Xiaoqi Yu, Yi-Jun He, and Siu Ming Yiu. "Improved Composite Order Bilinear Pairing on Graphics Hardware." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6738-6_90.
Full textMa, Chunbo, and Dake He. "A New Chameleon Multi-signature Based on Bilinear Pairing." In Grid and Cooperative Computing - GCC 2004 Workshops. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30207-0_41.
Full textZhang, Ye, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, and Siu Ming Yiu. "Acceleration of Composite Order Bilinear Pairing on Graphics Hardware." In Information and Communications Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_31.
Full textConference papers on the topic "Bilinear pairing"
Zhen, Hong-hu, and Yue Chen. "Bilinear Pairing Based DAA Protocol." In 2009 International Conference on Computational Intelligence and Natural Computing (CINC). IEEE, 2009. http://dx.doi.org/10.1109/cinc.2009.116.
Full textTang, Peng-zhi, Qing-lan Zhang, and Jun-fang Yang. "Certificateless signcryption scheme based on bilinear pairing." In 2015 2nd International Conference on Wireless Communication and Sensor Network (WCSN 2015). WORLD SCIENTIFIC, 2016. http://dx.doi.org/10.1142/9789813140011_0046.
Full textWang, Mingwen, Zhiyuan Ren, Jun Cai, and Wentao Zheng. "A biometric signcryption scheme without bilinear pairing." In 2012 International Conference on Graphic and Image Processing, edited by Zeng Zhu. SPIE, 2013. http://dx.doi.org/10.1117/12.2002003.
Full textCui, Li, Bai Yun, Shi Lin, and Bai Wenhua. "A New Certificateless Signcryption Scheme Without Bilinear Pairing." In 2018 13th International Conference on Computer Science & Education (ICCSE). IEEE, 2018. http://dx.doi.org/10.1109/iccse.2018.8468859.
Full text"Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation." In 1st International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005273002380245.
Full textYu, Rongwei, Lina Wang, Yanzhou Zhou, and Xianhui Niu. "An Optimized Anonymous Attestation Protocol from Bilinear Pairing." In 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing. IEEE, 2009. http://dx.doi.org/10.1109/embeddedcom-scalcom.2009.82.
Full textLin, Chih-Hsun, and Chia-Mu Yu. "Privacy-Preserving Record Linkage via Bilinear Pairing Approach." In 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW). IEEE, 2018. http://dx.doi.org/10.1109/icce-china.2018.8448454.
Full textElsheh, Esam, and A. Ben Hmaza. "A group key agreement protocol using bilinear pairing." In 2008 Canadian Conference on Electrical and Computer Engineering - CCECE. IEEE, 2008. http://dx.doi.org/10.1109/ccece.2008.4564597.
Full textShen, Jun, Kai Wang, Zhong Lv, Jie Yu, Yue Cui, and Jianxue Zheng. "A Certificateless Aggregate Signature Scheme without Bilinear Pairing." In CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy. ACM, 2024. http://dx.doi.org/10.1145/3672919.3672935.
Full textKarati, Arijit, and G. P. Biswas. "A practical identity based signcryption scheme from bilinear pairing." In 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2016. http://dx.doi.org/10.1109/icacci.2016.7732149.
Full text