Results 11 to 20 of about 30,753 (229)

Hardware acceleration of number theoretic transform for zk‐SNARK

open access: yesEngineering Reports, EarlyView., 2023
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao   +6 more
wiley   +1 more source

Bilinear pairings on elliptic curves [PDF]

open access: yesL’Enseignement Mathématique, 2016
We give an elementary and self-contained introduction to pairings on elliptic curves over finite fields. The three different definitions of the Weil pairing that can be found in the literature are stated and proved to be equivalent using Weil reciprocity. Pairings with shorter loops, such as the ate, ate
openaire   +3 more sources

Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings

open access: yesIEEE Access, 2018
Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes are constructed based on the bilinear pairing computation, a time ...
Liaojun Pang   +3 more
doaj   +1 more source

Omni-Lie 2-algebras and their Dirac structures [PDF]

open access: yes, 2011
We introduce the notion of omni-Lie 2-algebra, which is a categorification of Weinstein's omni-Lie algebras. We prove that there is a one-to-one correspondence between strict Lie 2-algebra structures on 2-sub-vector spaces of a 2-vector space $\V$ and ...
Baez   +14 more
core   +1 more source

Digital multi-signature scheme based on bilinear pairing

open access: yes网络与信息安全学报, 2016
Based on bilinear pairing and three complicated problems,a new digital multi-signature scheme was pro-posed.In the new scheme,the advantage of fast signature in broadcasting digital multi-signature was applied to se-quential digital multi-signature.By ...
Cai-juan ZHANG, Lin YOU
doaj   +3 more sources

ID-based Sever-aided Verification Proxy Re-signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
Signature verification in the existing ID-based proxy re-signature schemes includes time-consuming bilinear pairing operations,which are not suitable for low-power devices.In order to improve the efficiency of signature verification,combined with server ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj   +1 more source

Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Due to the real-time requirement of message in vehicle ad hoc networks, it is a challenge to design an authentication for vehicle ad hoc networks to achieve security, efficiency, and conditional privacy-preserving.
Libing Wu   +4 more
doaj   +1 more source

Pairing-Free for Public Key Encryption With Equality Test Scheme

open access: yesIEEE Access, 2021
The modular exponentiation has been proved better in terms of computational efficiency as compared to bilinear pairing. Therefore, discrete logarithm, a concept of modular exponentiation may be incorporated to present improved security schemes. With this
Huijun Zhu   +3 more
doaj   +1 more source

Efficient identity-based authenticated multiple key exchange protocol - doi: 10.4025/actascitechnol.v35i4.16434

open access: yesActa Scientiarum: Technology, 2013
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party.
Yitao Chen, Weiwei Han
doaj   +1 more source

The review on elliptic curves as cryptographic pairing groups [PDF]

open access: yesMathematics and Computational Sciences, 2021
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj   +1 more source

Home - About - Disclaimer - Privacy