Results 11 to 20 of about 10,318 (256)

An Enhanced Identity-based Authentication Key Agreement Protocol for Mobile Internet [PDF]

open access: yesJisuanji gongcheng, 2019
To address the problems of time-consuming bilinear pairings and the heavy burden of PKI certificate management,WANG Z,et al.proposed an identity-based efficient Authentication Key Agreement(AKA) protocol for mobile Internet(Journal of Communications,2017,
SUN Haiyan, LI Lingling, ZHANG Ling, ZHANG Jianwei, HUANG Wanwei
doaj   +1 more source

Efficient and secure pairing-free certificateless directed signature scheme

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
In an ordinary signature scheme any one can verify the validity of a signature produced by the signer. But public verifiability of signatures is not desirable in some applications where the signed message is sensitive to the signature receiver, for ...
Gayathri Nemani Bhagya   +3 more
doaj   +1 more source

Hardware acceleration of number theoretic transform for zk‐SNARK

open access: yesEngineering Reports, EarlyView., 2023
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao   +6 more
wiley   +1 more source

Bilinear pairings on elliptic curves [PDF]

open access: yesL’Enseignement Mathématique, 2016
We give an elementary and self-contained introduction to pairings on elliptic curves over finite fields. The three different definitions of the Weil pairing that can be found in the literature are stated and proved to be equivalent using Weil reciprocity. Pairings with shorter loops, such as the ate, ate
openaire   +3 more sources

Bilinear Identity for q-Hypergeometric Integrals [PDF]

open access: yes, 1998
We describe a bilinear identity satisfied by certain multidimensional q-hypergeometric integrals. The identity can be considered as a deformation of the Riemann bilinear relation for the twisted de Rham (co)homologies.
Tarasov, Vitaly
core   +3 more sources

Implementation of Boneh - Lynn - Shacham short digital signature scheme using Weil bilinear pairing based on supersingular elliptic curves

open access: yesVietnam Journal of Science, Technology and Engineering, 2022
One option for a digital signature solution for devices with low memory and low bandwidth transmission over channels uses a short digital signature scheme based on Weil bilinear pairing aimed at short processing times, fast computation, and convenient ...
Nhu-Quynh Luc   +2 more
doaj   +1 more source

Duality between quantum symmetric algebras [PDF]

open access: yes, 2006
Using certain pairings of couples, we obtain a large class of two-sided non-degenerated graded Hopf pairings for quantum symmetric algebras.Comment: 15 pages. Letters in Math.
C. Cibils   +13 more
core   +2 more sources

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]

open access: yes, 2009
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert   +15 more
core   +5 more sources

Efficient identity-based key encapsulation to multiple parties [PDF]

open access: yes, 2005
We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM), and define a security model for it. This concept is the identity based analogue of public key KEM to multiple parties.
Barbosa, Manuel, Farshim, P.
core   +2 more sources

Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings

open access: yesIEEE Access, 2018
Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes are constructed based on the bilinear pairing computation, a time ...
Liaojun Pang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy