Results 31 to 40 of about 671,694 (290)

Using Abelian Varieties to Improve Pairing-Based Cryptography [PDF]

open access: yesJournal of Cryptology, 2008
In this long and quite technical paper the authors study several aspects of Pairing-Based Cryptography. Bilinear pairings (Weil and Tate pairings) on elliptic curves or higher dimensional abelian varieties are used in Cryptography both in a constructive and destructive way, see [Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, FL:
Rubin, K., Silverberg, A.
openaire   +1 more source

Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice

open access: yesDesigns, Codes and Cryptography, 2022
Attribute-based encryption (ABE) cryptographically implements fine-grained access control on data. As such, data can be stored by an entity that is not necessarily trusted to enforce access control, or an entity that is not even trusted to have access to
M. Venema, Greg Alpár, J. Hoepman
semanticscholar   +1 more source

On the ρ-values of complete families of pairing-friendly elliptic curves

open access: yesJournal of Mathematical Cryptology, 2012
The parameter ρ of a complete family of pairing-friendly elliptic curves represents how suitable some given elliptic curves are in pairing-based cryptographic schemes. The superiority of the curves depends on how close ρ is to 1.
Okano Keiji
doaj   +1 more source

Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC

open access: yesIEEE Access, 2019
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj   +1 more source

Heuristics on pairing-friendly elliptic curves

open access: yesJournal of Mathematical Cryptology, 2012
We present a heuristic asymptotic formula as for the number of isogeny classes of pairing-friendly elliptic curves over prime fields with fixed embedding degree , with fixed discriminant, with rho-value bounded by a fixed such that , and with prime ...
Boxall John
doaj   +1 more source

Implementing Health‐Related Quality of Life Assessment in Pediatric Oncology: A Feasibility Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background There is growing interest in embedding health‐related quality of life (HRQoL) assessment and patient‐reported outcome measures (PROMs) within clinical cancer care. This study evaluated the feasibility, acceptability, and usability of implementing an electronic PROM (ePROM) platform to measure HRQoL in children with cancer ...
Mikaela Doig   +13 more
wiley   +1 more source

Fast AVX-512 Implementation of the Optimal Ate Pairing on BLS12-381

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Non-degenerate bilinear maps on elliptic curves, commonly referred to as pairings, have many applications including short signature schemes, zero-knowledge proofs and remote attestation protocols.
Hao Cheng   +3 more
doaj   +1 more source

Treatment Decision‐Making Roles and Preferences Among Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Decision‐making (DM) dynamics between adolescents and young adults (AYAs) with cancer, parents, and oncologists remain underexplored in diverse populations. We examined cancer treatment DM preferences among an ethnically and socioeconomically diverse group of AYAs and their parents.
Amanda M. Gutierrez   +14 more
wiley   +1 more source

On the Security of Certificateless Signature Schemes

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj   +1 more source

Arithmetic Operators for Pairing-Based Cryptography [PDF]

open access: yes, 2007
Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of protocols. Software implementations being rather slow, the study of hardware architectures became an active research area. In this paper, we first study an accelerator for the i¾?
Beuchat, Jean-Luc   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy