Results 11 - 20
of
208
New Short Signature Scheme with Weil Pairing
"... Short signature is an essential component in cryptography. Short digital signatures are needed in environments where a human is asked to manually key in the signature.. In this paper we propose a new short signature scheme with weil pairing. Also we analyze security and efficiency of our scheme. Sec ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Short signature is an essential component in cryptography. Short digital signatures are needed in environments where a human is asked to manually key in the signature.. In this paper we propose a new short signature scheme with weil pairing. Also we analyze security and efficiency of our scheme
On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves
"... The hyperelliptic curve Ate pairing provides an efficient way to compute a bilinear pairing on the Jacobian variety of a hyperelliptic curve. We prove that, for supersingular elliptic curves with embedding degree two, square of the Ate pairing is nothing but the Weil pairing. Using the formula, we d ..."
Abstract
- Add to MetaCart
The hyperelliptic curve Ate pairing provides an efficient way to compute a bilinear pairing on the Jacobian variety of a hyperelliptic curve. We prove that, for supersingular elliptic curves with embedding degree two, square of the Ate pairing is nothing but the Weil pairing. Using the formula, we
Multi-Recipient Public Key Encryption Scheme Based on Weil Pairing
"... Abstract: This paper proposes a multiple-recipient public key encryption, called pairing-based multi-recipient encryption (PBMRE). The proposed scheme is constructed on Weil pairing on elliptic curves and the Shamir’s secrets sharing scheme. As a result, a private key for decryption can be converte ..."
Abstract
- Add to MetaCart
Abstract: This paper proposes a multiple-recipient public key encryption, called pairing-based multi-recipient encryption (PBMRE). The proposed scheme is constructed on Weil pairing on elliptic curves and the Shamir’s secrets sharing scheme. As a result, a private key for decryption can
A New Short Signature Scheme from Weil Pairing
"... Currently, short signature is receiving significant attention since it is particularly useful in low-bandwidth communication environments. In this paper, a short signature scheme is proposed from weil pairing. The proposed scheme is efficient as lesser number of cost effective pairing operations inv ..."
Abstract
- Add to MetaCart
Currently, short signature is receiving significant attention since it is particularly useful in low-bandwidth communication environments. In this paper, a short signature scheme is proposed from weil pairing. The proposed scheme is efficient as lesser number of cost effective pairing operations
Fast Elliptic curve arithmetic and improved Weil pairing Evaluation
- Topics in Cryptology – CT-RSA 2003
, 2003
"... Abstract. We present an algorithm which speeds scalar multiplication on a general elliptic curve by an estimated 3.8 % to 8.5 % over the best known general methods when using affine coordinates. This is achieved by eliminating a field multiplication when we compute 2P +Q from given points P, Q on th ..."
Abstract
-
Cited by 34 (5 self)
- Add to MetaCart
on the curve. We give applications to simultaneous multiple scalar multiplication and to the Elliptic Curve Method of factorization. We show how this improvement together with another idea can speed the computation of the Weil and Tate pairings by up to 7.8%.
A WEIL PAIRING ON THE p-TORSION OF ORDINARY ELLIPTIC CURVES OVER K[ǫ]
, 2007
"... Abstract. For an elliptic curve E over any field K, the Weil pairing en is a bilinear map on n-torsion. For K of characteristic p> 0, the map en is degenerate if and only if n is divisible by p. In this paper, we consider E over the dual numbers K[ǫ] and define a non-degenerate “Weil pairing on p ..."
Abstract
-
Cited by 4 (2 self)
- Add to MetaCart
Abstract. For an elliptic curve E over any field K, the Weil pairing en is a bilinear map on n-torsion. For K of characteristic p> 0, the map en is degenerate if and only if n is divisible by p. In this paper, we consider E over the dual numbers K[ǫ] and define a non-degenerate “Weil pairing
A New Zero Knowledge Identification Scheme based on Weil Pairing
"... Many identification schemes have been proposed in which security are based on the intractability of factoring or DLP (Discrete Logarithm Problem). In 2009, Massoud et.al gave identification scheme whose security was based on solving ECDLP (Elliptic Curve Discrete Logarithm Problem). The security of ..."
Abstract
- Add to MetaCart
Many identification schemes have been proposed in which security are based on the intractability of factoring or DLP (Discrete Logarithm Problem). In 2009, Massoud et.al gave identification scheme whose security was based on solving ECDLP (Elliptic Curve Discrete Logarithm Problem). The security of this scheme is improved in order to propose a more secure and efficient scheme. The security of proposed scheme is based on expressing torsion point of elliptic curve into linear combination of basis points. This is more complicated than solving ECDLP and thus provides a higher level of security. Also proposed scheme is more efficient with respect to encryption and decryption since it requires only minimal operations in both algorithms.
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing
- Proceedings of International Conference on Advanced Information Networking and Applications (AINA 2005
"... In 2000, Joux proposed a one-round protocol for tripartite Diffie-Hellman. In 2003, Shim presented an efficient one-round tripartite authenticated key agreement protocol based on Weil pairing to resist the man-in-the-middle attack appears in Joux ’ s. In this paper, we show that Shim ’ s protocol st ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
In 2000, Joux proposed a one-round protocol for tripartite Diffie-Hellman. In 2003, Shim presented an efficient one-round tripartite authenticated key agreement protocol based on Weil pairing to resist the man-in-the-middle attack appears in Joux ’ s. In this paper, we show that Shim ’ s protocol
An improvement on a three-party password-based key exchange protocol using weil pairing,” International Journal of Network Security
- Department of Computer Science at National Chung Hsing University, Taichung, Taiwan. He
, 2010
"... The three-party password-based key exchange protocols using Weil pairing proposed by Wen is vulnerable to impersonation attack. By introducing hard artificial intelligence problem, we show an improved protocol, which can resist against not only the impersonation attack but also all the other well-kn ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
The three-party password-based key exchange protocols using Weil pairing proposed by Wen is vulnerable to impersonation attack. By introducing hard artificial intelligence problem, we show an improved protocol, which can resist against not only the impersonation attack but also all the other well
Math 842: Final Project 12/15/04 Project: Supersingular Curves and the Weil Pairing in Elliptic Curve Cryptography
"... Even first semester calculus students are aware of how calculus, hence analysis, is used to solve problems in engineering. In recent decades the engineering world is gaining more exposure to algebra through the powerful problem solutions it provides. One area that algebra has made significant contri ..."
Abstract
- Add to MetaCart
Even first semester calculus students are aware of how calculus, hence analysis, is used to solve problems in engineering. In recent decades the engineering world is gaining more exposure to algebra through the powerful problem solutions it provides. One area that algebra has made significant contributions to is cryptography and, more specifically, public key cryptography. In this paper we
Results 11 - 20
of
208