[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

Identity-based encryption from the Weil pairing

D Boneh, M Franklin - Annual international cryptology conference, 2001 - Springer
We propose a fully functional identity-based encryption scheme (IBE). The scheme has
chosen ciphertext security in the random oracle model assuming an elliptic curve variant of …

Elliptic curve cryptography

D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …

Short signatures from the Weil pairing

D Boneh, B Lynn, H Shacham - International conference on the theory and …, 2001 - Springer
We introduce a short signature scheme based on the Computational Diffie-Hellman
assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size …

Certificateless public key cryptography

SS Al-Riyami, KG Paterson - International conference on the theory and …, 2003 - Springer
This paper introduces and makes concrete the concept of certificateless public key
cryptography (CL-PKC), a model for the use of public key cryptography which avoids the …

Identity-based encryption from the Weil pairing

D Boneh, M Franklin - SIAM journal on computing, 2003 - SIAM
We propose a fully functional identity-based encryption (IBE) scheme. The scheme has
chosen ciphertext security in the random oracle model assuming a variant of the …

Short signatures from the Weil pairing

D Boneh, B Lynn, H Shacham - Journal of cryptology, 2004 - Springer
We introduce a short signature scheme based on the Computational Diffie–Hellman
assumption on certain elliptic and hyperelliptic curves. For standard security parameters, the …

An identity-based signature from gap Diffie-Hellman groups

JC Choon, J Hee Cheon - Public Key Cryptography—PKC 2003: 6th …, 2002 - Springer
In this paper we propose an identity (ID)-based signature scheme using gap Diffie-Hellman
(GDH) groups. Our scheme is proved secure against existential forgery on adaptively …

Efficient identity based signature schemes based on pairings

F Hess - Selected Areas in Cryptography: 9th Annual …, 2003 - Springer
We develop an efficient identity based signature scheme based on pairings whose security
relies on the hardness of the Diffie-Hellman problem in the random oracle model. We …

Efficient algorithms for pairing-based cryptosystems

PSLM Barreto, HY Kim, B Lynn, M Scott - Advances in Cryptology …, 2002 - Springer
We describe fast new algorithms to implement recent cryptosystems based on the Tate
pairing. In particular, our techniques improve pairing evaluation speed by a factor of about …