Results 11 to 20 of about 10,318 (256)
An Enhanced Identity-based Authentication Key Agreement Protocol for Mobile Internet [PDF]
To address the problems of time-consuming bilinear pairings and the heavy burden of PKI certificate management,WANG Z,et al.proposed an identity-based efficient Authentication Key Agreement(AKA) protocol for mobile Internet(Journal of Communications,2017,
SUN Haiyan, LI Lingling, ZHANG Ling, ZHANG Jianwei, HUANG Wanwei
doaj +1 more source
Efficient and secure pairing-free certificateless directed signature scheme
In an ordinary signature scheme any one can verify the validity of a signature produced by the signer. But public verifiability of signatures is not desirable in some applications where the signed message is sensitive to the signature receiver, for ...
Gayathri Nemani Bhagya +3 more
doaj +1 more source
Hardware acceleration of number theoretic transform for zk‐SNARK
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao +6 more
wiley +1 more source
Bilinear pairings on elliptic curves [PDF]
We give an elementary and self-contained introduction to pairings on elliptic curves over finite fields. The three different definitions of the Weil pairing that can be found in the literature are stated and proved to be equivalent using Weil reciprocity. Pairings with shorter loops, such as the ate, ate
openaire +3 more sources
Bilinear Identity for q-Hypergeometric Integrals [PDF]
We describe a bilinear identity satisfied by certain multidimensional q-hypergeometric integrals. The identity can be considered as a deformation of the Riemann bilinear relation for the twisted de Rham (co)homologies.
Tarasov, Vitaly
core +3 more sources
One option for a digital signature solution for devices with low memory and low bandwidth transmission over channels uses a short digital signature scheme based on Weil bilinear pairing aimed at short processing times, fast computation, and convenient ...
Nhu-Quynh Luc +2 more
doaj +1 more source
Duality between quantum symmetric algebras [PDF]
Using certain pairings of couples, we obtain a large class of two-sided non-degenerated graded Hopf pairings for quantum symmetric algebras.Comment: 15 pages. Letters in Math.
C. Cibils +13 more
core +2 more sources
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert +15 more
core +5 more sources
Efficient identity-based key encapsulation to multiple parties [PDF]
We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM), and define a security model for it. This concept is the identity based analogue of public key KEM to multiple parties.
Barbosa, Manuel, Farshim, P.
core +2 more sources
Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings
Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes are constructed based on the bilinear pairing computation, a time ...
Liaojun Pang +3 more
doaj +1 more source

