Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to di...

Full description

Bibliographic Details
Main Authors: Maocai Wang, Guangming Dai, Kim-Kwang Raymond Choo, Prem Prakash Jayaraman, Rajiv Ranjan
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2016-01-01
Series:PLoS ONE
Online Access:http://europepmc.org/articles/PMC5001717?pdf=render