Exponentiating in Pairing Groups

被引:17
作者
Bos, Joppe W. [1 ]
Costello, Craig [1 ]
Naehrig, Michael [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
来源
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013 | 2014年 / 8282卷
关键词
IDENTITY-BASED ENCRYPTION; FRIENDLY ELLIPTIC-CURVES; CRYPTOGRAPHY;
D O I
10.1007/978-3-662-43414-7_22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study exponentiations in pairing groups for the most common security levels and show that, although the Weierstrass model is preferable for pairing computation, it can be worthwhile to map to alternative curve representations for the non-pairing group operations in protocols.
引用
收藏
页码:438 / 455
页数:18
相关论文
共 51 条
  • [1] [Anonymous], 2007, EXPLICIT FORMULAS DA
  • [2] [Anonymous], 2012, MATH PUBLIC KEY CRYP
  • [3] [Anonymous], 2010, THESIS QUEENSLAND U
  • [4] [Anonymous], 2000, S CRYPT INF SEC
  • [5] Aranha Diego F., 2012, Pairing-Based Cryptography - Pairing 2012. 5th International Conference. Revised Selected Papers, P177, DOI 10.1007/978-3-642-36334-4_11
  • [6] Aranha DF, 2011, LECT NOTES COMPUT SC, V6632, P48, DOI 10.1007/978-3-642-20465-4_5
  • [7] Barreto PSLM, 2006, LECT NOTES COMPUT SC, V3897, P319
  • [8] Barreto PSLM, 2003, LECT NOTES COMPUT SC, V2576, P257
  • [9] Benger N, 2010, LECT NOTES COMPUT SC, V6087, P180, DOI 10.1007/978-3-642-13797-6_13
  • [10] Bernstein D.J., TWISTED HESSIAN CURV