Results 11 to 20 of about 30,753 (229)
Hardware acceleration of number theoretic transform for zk‐SNARK
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao +6 more
wiley +1 more source
Bilinear pairings on elliptic curves [PDF]
We give an elementary and self-contained introduction to pairings on elliptic curves over finite fields. The three different definitions of the Weil pairing that can be found in the literature are stated and proved to be equivalent using Weil reciprocity. Pairings with shorter loops, such as the ate, ate
openaire +3 more sources
Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings
Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes are constructed based on the bilinear pairing computation, a time ...
Liaojun Pang +3 more
doaj +1 more source
Omni-Lie 2-algebras and their Dirac structures [PDF]
We introduce the notion of omni-Lie 2-algebra, which is a categorification of Weinstein's omni-Lie algebras. We prove that there is a one-to-one correspondence between strict Lie 2-algebra structures on 2-sub-vector spaces of a 2-vector space $\V$ and ...
Baez +14 more
core +1 more source
Digital multi-signature scheme based on bilinear pairing
Based on bilinear pairing and three complicated problems,a new digital multi-signature scheme was pro-posed.In the new scheme,the advantage of fast signature in broadcasting digital multi-signature was applied to se-quential digital multi-signature.By ...
Cai-juan ZHANG, Lin YOU
doaj +3 more sources
ID-based Sever-aided Verification Proxy Re-signature Scheme [PDF]
Signature verification in the existing ID-based proxy re-signature schemes includes time-consuming bilinear pairing operations,which are not suitable for low-power devices.In order to improve the efficiency of signature verification,combined with server ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj +1 more source
Due to the real-time requirement of message in vehicle ad hoc networks, it is a challenge to design an authentication for vehicle ad hoc networks to achieve security, efficiency, and conditional privacy-preserving.
Libing Wu +4 more
doaj +1 more source
Pairing-Free for Public Key Encryption With Equality Test Scheme
The modular exponentiation has been proved better in terms of computational efficiency as compared to bilinear pairing. Therefore, discrete logarithm, a concept of modular exponentiation may be incorporated to present improved security schemes. With this
Huijun Zhu +3 more
doaj +1 more source
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party.
Yitao Chen, Weiwei Han
doaj +1 more source
The review on elliptic curves as cryptographic pairing groups [PDF]
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj +1 more source

