BN曲线上的R-ate双线性对快速计算研究
摘要
关键词
全文:
PDF参考
[1]陆强, 朱万红, 李昊. PKI 技术的算法实现及体系结构[J]. 信息安全与通信保密, 2006(9): 131-135.[2]尹晓晖. PKI 技术在应用系统中的应用[J]. 信息安全与通信保密, 2008(3): 64-65.[3]A. Shamir. Identity-based Cryptosystems and Signature Schemes[J]. Advances in cryptology. Springer Berlin Heidelberg, 1985: 47-53.[4]D. Boneh, M. Franklin. Identity-based encryption from the Weil pairing[J]. Advances in Cryptology-CRYPTO 2001, vol. 2139 of LNCS, pages 213-29. Springer-Verlag, 2001.[5]F. Vercauteren. Optimal pairings[J]. IEEE transactions on information Theory, 56(1): 455-461, January 2010.[6]P. Barreto, H. Kim, B. Lynn, M. Scott. Efficient algorithms for pairing-based cryptosystems[J]. Advances in Cryptology-CRYPTO 2002, Springer LNCS, Vol. 2442, pages 354-368, 2002.[7]P. Barreto, S. Galbraith, C. Eigeartaigh, M. Scott. Efficient pairing computation on supersingular Abelian varieties[J]. Designs, Codes and Cryptography, 42: 239-271, 2007.[8]P. Barreto, M. Naehrig. Pairing-friendly elliptic curves of prime order[J]. Selected Areas in Cryptography-SAC2005, vol. 3897 of LNCS, pages 319-331. Springer 2006.[9]M. Scott, N. Benger, M. Charlemagne, L.J. Dominguez Perez, E.J. Kachisa. On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves.[10]D. Hankerson, A. Menezes, S. Vanstone. Guide to Elliptic Curve Cryptography[M]. New York: Springer-Verlag, 2004.
DOI: http://dx.doi.org/10.12361/2661-3476-05-11-149735
Refbacks
- 当前没有refback。