Results 271 to 280 of about 2,086,846 (295)
Some of the next articles are maybe not open access.

Cryptography Based on Bilinear Maps

2006
The bilinear mapping technique that uses the (Weil and Tate) pairings over elliptic (or hyperelliptic) curves represents a great breakthrough in cryptography. This paper surveys this new trend in cryptography, and emphasizes the design of efficient cryptographic primitives that are provably secure in the standard model (i.e., without the random oracle ...
openaire   +1 more source

Provably Secure Threshold-Based ABE Scheme Without Bilinear Map

The Arabian journal for science and engineering, 2016
Arijit Karati, Ruhul Amin, G. P. Biswas
semanticscholar   +1 more source

Structural Mappings of Bilinear Transformations

2000
In this chapter, we present a comprehensive picture of the mapping of structural properties associated with general linear multivariable systems under bilinear and inverse bilinear transformations. We will investigate in depth how the finite and infinite zero structures, as well as the invertibility structures of a general continuous-time (discrete ...
openaire   +1 more source

Constructions Based on Bilinear Maps

2010
In the past 10 years cryptographic constructions based on bilinear maps have become extremely popular, most prominently following their use in constructing identity-based encryption schemes. Bilinear maps have also led to several efficient signature schemes, and we explore two such constructions here.
openaire   +1 more source

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions

The Cryptographer's Track at RSA Conference, 2013
Karyn Benson, H. Shacham, Brent Waters
semanticscholar   +1 more source

Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map

International Conference on Security and Cryptography for Networks, 2004
Fabien Laguillaumie, Damien Vergnaud
semanticscholar   +1 more source

New traitor tracing schemes using bilinear map

ACM Digital Rights Management Workshop, 2003
Vu Dong Tô   +2 more
semanticscholar   +1 more source

An Improved Identity-Based Encryption Scheme Without Bilinear Map

International Conference on Multimedia Information Networking and Security, 2009
Minghui Zheng, Hui-Hua Zhou, Guohua Cui
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy