Results 21 to 30 of about 671,694 (290)

A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography

open access: yesIEEE Access, 2017
Nowadays, telemedicine is an emerging healthcare service where the healthcare professionals can diagnose, evaluate, and treat a patient using telecommunication technology.
Hadeal Abdulaziz Al Hamid   +4 more
semanticscholar   +1 more source

Self-pairings on hyperelliptic curves

open access: yesJournal of Mathematical Cryptology, 2013
A self-pairing is a pairing computation where both inputs are the same group element. Self-pairings are used in some cryptographic schemes and protocols. In this paper, we show how to compute the Tate–Lichtenbaum pairing on a curve more efficiently than
Galbraith Steven D., Zhao Chang-An
doaj   +1 more source

Simplified pairing computation and security implications

open access: yesJournal of Mathematical Cryptology, 2007
Recent progress on pairing implementation has made certain pairings extremely simple and fast to compute. Hence, it is natural to examine if there are consequences for the security of pairing-based cryptography.
Galbraith Steven D.   +2 more
doaj   +1 more source

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

Pairing-Based Cryptography on the Internet of Things: A Feasibility Study

open access: yesWired/Wireless Internet Communications, 2018
Pairing-based cryptography (PBC) has recently received much attention, since the mathematical building block of pairings paved the ground for devising efficient cryptographic protocols exploiting an old inspiration, i.e., to produce the public key of an ...
Ioanna Karantaidou   +4 more
semanticscholar   +1 more source

PRESTvO: PRivacy Enabled Smartphone Based Access to Vehicle On-Board Units

open access: yesIEEE Access, 2020
Smartphones are quickly moving toward complementing or even replacing traditional car keys. We advocate a role-based access control policy mixed with attributes that facilitates access to various functionalities of vehicular on-board units from ...
Bogdan Groza   +4 more
doaj   +1 more source

First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography

open access: yesInternational Conference on Security and Cryptography, 2017
The field of Pairing Based Cryptography (PBC) has seen recent advances in the simplification of their calculations and in the implementation of original protocols for security and privacy.
Damien Jauvart   +2 more
semanticscholar   +1 more source

Practical Certificate-Less Infrastructure with Application in TLS

open access: yesCryptography, 2023
We propose highly efficient certificate-less (CL) protocols for the infrastructure used by authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without pairing, which means it can be easily supported by most industrial ...
Li Duan, Yong Li, Lijun Liao
doaj   +1 more source

Bilinear cryptography using Lie algebras from p-groups [PDF]

open access: yesMathematics and Computational Sciences, 2021
Pairings are particular bilinear maps, and they have been defined based on elliptic curves whichare abelian groups. In cryptography and security problems use these pairings. Mrabet et al. proposedpairings from a tensor product of groups in 2013.
Elaheh Khamseh
doaj   +1 more source

Pairing Based Cryptography

open access: yes, 2022
In dieser Masterarbeit untersuchen wir Pairings auf elliptischen Kurven, deren Anwendung in der Kryptographie und deren Berechnung. Pairings sind bestimmte bilineare Funktionen zwischen Gruppen, wobei wir solche Abbildungen insbesondere für die Gruppe der Punkte elliptischer Kurven finden können. Beide diese Begriffe werden in dieser Arbeit eingeführt.
openaire   +2 more sources

Home - About - Disclaimer - Privacy