2008
DOI: 10.1016/j.dam.2007.12.010
|View full text |Cite
|
Sign up to set email alerts
|

Pairings for cryptographers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
238
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 569 publications
(263 citation statements)
references
References 7 publications
1
238
0
Order By: Relevance
“…More specifically, one may use Type-2 pairings, where there is an efficiently computable group isomorphism ψ : G 2 → G 1 mapping g 2 ∈ G 2 to g 1 ∈ G 1 , or Type-3 pairings, where there is no known efficiently computable group isomorphism ψ : G 2 → G 2 mapping g 2 to g 1 . We refer readers to [18] for the details of these three types of pairings.…”
Section: The N-bdh Assumptionmentioning
confidence: 99%
“…More specifically, one may use Type-2 pairings, where there is an efficiently computable group isomorphism ψ : G 2 → G 1 mapping g 2 ∈ G 2 to g 1 ∈ G 1 , or Type-3 pairings, where there is no known efficiently computable group isomorphism ψ : G 2 → G 2 mapping g 2 to g 1 . We refer readers to [18] for the details of these three types of pairings.…”
Section: The N-bdh Assumptionmentioning
confidence: 99%
“…In this section, we separate these two capabilities in Mtaes 2 , making use of a so-called Type-2 or Type-3 pairing-friendly structure [13]. It consists in a tuple (G 1 , G 2 , G T , q, e, g 1 , g 2 ) where e is an admissible bilinear map [6], g 1 , g 2 and G = e (g 1 , g 2 ) are generators of G 1 , G 2 and G T respectively (and additionally there exists an e ciently computable isomorphism ψ : G 2 → G 1 in the case of Type-2 structure).…”
Section: Two-level Scheme Mtaesmentioning
confidence: 99%
“…The rst one does not split the roles of the issuer and the opener and can be applied in any group where the DDH assumption holds while the second scheme makes use of (Type-2 or Type-3 [13]) pairing-friendly groups, with asymmetric pairing where the XDH and the (asymmetric 1 ) DBDH assumptions hold, to separate the two authority roles (and then achieve the second above property). The two rst schemes lead to ciphertexts that are linear in the number of registered users.…”
Section: Introductionmentioning
confidence: 99%
“…Galbraith, Paterson and Smart [17] classify bilinear groups into three types according to the efficient morphisms that exist between the source groups G 1 and G 2 . Type I pairings have G 1 = G 2 and G = H, i.e., ψ is the identity function (or equivalently, it is an efficiently computable and efficiently invertible isomorphism).…”
Section: Bilinear Groupsmentioning
confidence: 99%
“…Galbraith, Paterson and Smart [17] classify pairings e : G 1 × G 2 → G T into three types depending on whether G 1 = G 2 (Type I), or there is an efficiently computable homomorphism ψ : G 2 → G 1 (Type II), or there is no efficiently Table 1. Most efficient structure-preserving signatures schemes for all three types of pairings, in terms of signature size, verification key size and number of verification equations.…”
Section: Introductionmentioning
confidence: 99%