메뉴 건너뛰기




Volumn E89-A, Issue 1, 2006, Pages 134-143

Efficient algorithms for Tate pairing

Author keywords

Elliptic curve cryptosystem; Fast computation; Tate pairing; Weil pairing

Indexed keywords

COMPUTATION THEORY; COMPUTER SCIENCE; CRYPTOGRAPHY; ELECTRONICS ENGINEERING; INFORMATION THEORY; NETWORK PROTOCOLS;

EID: 32244443498     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1093/ietfec/e89-a.1.134     Document Type: Article
Times cited : (22)

References (17)
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • Advances in Cryptology - CRYPTO'01, Springer-Verlag
    • D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," Advances in Cryptology - CRYPTO'01, LNCS 2139, pp.213-229, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Advances in Cryptology - ASIACRYPT'01, Springer-Verlag
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," Advances in Cryptology - ASIACRYPT'01, LNCS 2248, pp.514-532, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 5
    • 35248849357 scopus 로고    scopus 로고
    • Efficient computations of the Tate pairing for the large MOV degrees
    • ICISC'02, Springer-Verlag
    • T. Izu and T. Takagi, "Efficient computations of the Tate pairing for the large MOV degrees," ICISC'02, LNCS 2587, pp.283-297, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2587 , pp. 283-297
    • Izu, T.1    Takagi, T.2
  • 6
    • 84947743704 scopus 로고    scopus 로고
    • Efficient elliptic curve exponentiation using mixed coordinates
    • Advances in Cryptology -ASIACRYPT'98, ed. K. Ohta and D. Pei, Springer-Verlag, Berlin, Heidelberg, New York
    • H. Cohen, A. Miyaji, and T. Ono, "Efficient elliptic curve exponentiation using mixed coordinates," Advances in Cryptology -ASIACRYPT'98, ed. K. Ohta and D. Pei, LNCS 1514, pp.51-65, Springer-Verlag, Berlin, Heidelberg, New York, 1998.
    • (1998) LNCS , vol.1514 , pp. 51-65
    • Cohen, H.1    Miyaji, A.2    Ono, T.3
  • 7
    • 0035126332 scopus 로고    scopus 로고
    • Efficient scalar multiplications on elliptic curves with direct computations of several doublings
    • Jan.
    • Y. Sakai and K. Sakurai, "Efficient scalar multiplications on elliptic curves with direct computations of several doublings," IEICE Trans. Fundamentals, vol.E84-A, no.1, pp.120-129, Jan. 2001.
    • (2001) IEICE Trans. Fundamentals , vol.E84-A , Issue.1 , pp. 120-129
    • Sakai, Y.1    Sakurai, K.2
  • 9
    • 22044456811 scopus 로고    scopus 로고
    • Analysis of the sliding window powering algorithm
    • H. Cohen, "Analysis of the sliding window powering algorithm," J. Cryptol., vol.18, no.1, pp.63-76, 2005.
    • (2005) J. Cryptol. , vol.18 , Issue.1 , pp. 63-76
    • Cohen, H.1
  • 12
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • The extended abstract was presented at PKC'00
    • A.K. Lenstra and E.R. Verheul, "Selecting cryptographic key sizes," J. Cryptol., vol.14, no.4, pp.255-293, 2001. (The extended abstract was presented at PKC'00).
    • (2001) J. Cryptol. , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 13
    • 0032634944 scopus 로고    scopus 로고
    • Fast modular inversion algorithm to match any operation unit
    • May
    • T. Kobayashi and H. Morita, "Fast modular inversion algorithm to match any operation unit," IEICE Trans. Fundamentals, vol.E82-A, no.5, pp.733-740, May 1999.
    • (1999) IEICE Trans. Fundamentals , vol.E82-A , Issue.5 , pp. 733-740
    • Kobayashi, T.1    Morita, H.2
  • 14
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Advances in Cryptology-ASIACRYPT'02, Springer-Verlag
    • C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography," Advances in Cryptology-ASIACRYPT'02, LNCS 2501, pp.548-566, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 15
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • Advances in Cryptology - CRYPTO'04, Springer-Verlag
    • D. Boneh and X. Boyen, "Secure identity based encryption without random oracles," Advances in Cryptology - CRYPTO'04, LNCS 3152, pp.443-459, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 16
    • 0035336179 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reduction
    • May
    • A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reduction," IEICE Trans. Fundamentals, vol.E84-A, no.5, pp.1234-1243, May 2001.
    • (2001) IEICE Trans. Fundamentals , vol.E84-A , Issue.5 , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 17
    • 35248835023 scopus 로고    scopus 로고
    • Constructing elliptic curves with prescribed embedding degrees
    • Security in Communication Networks-SCN'2002
    • P.S.L.M. Barreto, B. Lynn, and M. Scott, "Constructing elliptic curves with prescribed embedding degrees," Security in Communication Networks-SCN'2002, LNCS 2576, pp.263-273, 2002.
    • (2002) LNCS , vol.2576 , pp. 263-273
    • Barreto, P.S.L.M.1    Lynn, B.2    Scott, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.