2014
DOI: 10.1007/978-3-662-44371-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
63
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 28 publications
(64 citation statements)
references
References 20 publications
1
63
0
Order By: Relevance
“…We for the first time investigate the complexity of bilinear-conversion and formally prove the difficulty of the problem. In the framework of [21] a scheme over Type-I group is represented by a graph called a dependency graph. It describes a flow of group operations in G over variables in the scheme.…”
Section: Our Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…We for the first time investigate the complexity of bilinear-conversion and formally prove the difficulty of the problem. In the framework of [21] a scheme over Type-I group is represented by a graph called a dependency graph. It describes a flow of group operations in G over variables in the scheme.…”
Section: Our Contributionmentioning
confidence: 99%
“…As vast number of schemes have been built over Type-I groups, e.g, [9][10][11][12][13][14][15], bilinear-type conversion methods that translate schemes designed for Type-I groups into ones that work over Type-III groups have been developed [16][17][18][19][20][21][22]. Recall that cryptographic schemes designed over Type-I groups do not necessarily work over Type-III groups due to the presence of symmetric pairings, e(X, X ).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Our tool 6 for the synthesis of SPS schemes consists of two components. The first component takes the description of a search space and generates all included SPS schemes.…”
Section: Synthesis Of Schemesmentioning
confidence: 99%
“…Their tool AutoGroup converts schemes in the Type I setting into schemes in the Type III setting, whereas their tool AutoStrong transforms an existentially unforgeable signature into a strongly unforgeable one, using SMT solvers to check whether the original signature satisfies a criterion allowing an efficient transformation. The idea of automatically transforming constructions from the symmetric to the asymmetric setting was further considered by Abe, Groth, Ohkubo and Tango [6], who develop an automated transformation of Type I protocols into Type III protocols.…”
Section: Other Related Workmentioning
confidence: 99%