Results 1 to 10 of about 12,868 (287)
Report on Pairing-based Cryptography. [PDF]
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings.
Moody D +5 more
europepmc +3 more sources
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of
Helena Rifà-Pous +1 more
doaj +6 more sources
I2PA: An Efficient ABC for IoT [PDF]
The Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography.
Ibou Sene +2 more
doaj +5 more sources
The review on elliptic curves as cryptographic pairing groups [PDF]
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj +1 more source
Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj +1 more source
This paper proposes a novel bilinear pairing-free identity-based privacy-preserving anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called “NIBPA”.
Yasin Genc +5 more
doaj +1 more source
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang +4 more
doaj +1 more source
Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI).
Zulianie Binti Jemihin +2 more
doaj +1 more source
Efficient and Provably Secure Certificateless Signature Schemes [PDF]
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj +1 more source
Rapid calculation of R-ate bilinear pairing in China state cryptography standard SM9 [PDF]
R-ate is an important bilinear mapping in the Identity-Based Cryptography(IBC) algorithm of China state cryptography standard SM9.Its computational performance is very important to the application of SM9 cryptosystem.To improve the computational ...
GAN Zhiwang,LIAO Fangyuan
doaj +1 more source

