Sciweavers

79 search results - page 8 / 16
» Cryptosystems Based on Elliptic Curve Pairing
Sort
View
IJNSEC
2010
152views more  IJNSEC 2010»
13 years 2 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
ESORICS
2004
Springer
14 years 26 days ago
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
Bodo Möller
PAIRING
2010
Springer
133views Cryptology» more  PAIRING 2010»
13 years 5 months ago
Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree
Scott uses an efficiently computable isomorphism in order to optimize pairing computation on a particular class of curves with embedding degree 2. He points out that pairing implem...
Sorina Ionica, Antoine Joux
CCS
2010
ACM
14 years 2 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
25
Voted
JOC
2006
80views more  JOC 2006»
13 years 7 months ago
Elliptic Curves with Low Embedding Degree
Motivated by the needs of the pairing based cryptography, Miyaji, Nakabayashi and Takano have suggested a construction of so-called MNT elliptic curves with low embedding degree. ...
Florian Luca, Igor Shparlinski