Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to di...
Main Authors: | Maocai Wang, Guangming Dai, Kim-Kwang Raymond Choo, Prem Prakash Jayaraman, Rajiv Ranjan |
---|---|
Format: | Article |
Language: | English |
Published: |
Public Library of Science (PLoS)
2016-01-01
|
Series: | PLoS ONE |
Online Access: | http://europepmc.org/articles/PMC5001717?pdf=render |
Similar Items
-
Heuristics on pairing-friendly elliptic curves
by: Boxall John
Published: (2012-10-01) -
On the ρ-values of complete families of pairing-friendly elliptic curves
by: Okano Keiji
Published: (2012-12-01) -
On the non-idealness of cyclotomic families of pairing-friendly elliptic curves
by: Sha Min
Published: (2014-12-01) -
Generating pairing-friendly elliptic curve parameters using sparse families
by: Fotiadis Georgios, et al.
Published: (2018-06-01) -
Height pairings on elliptic curves
by: Plater, Andrew John
Published: (1991)