Pairing-based cryptography

Pairing-based cryptography

Pairing-based cryptography is the use of a pairing between elements of two groups to a third group to construct cryptographic systems. Usually the same group is used for the first two groups, making the pairing in fact a mapping from two elements from one group to an element form a second group. In this way, pairings can be used to reduce a hard problem in one group to a different, usually easier problem in another group.

For example, in groups equipped with a bilinear mapping such as the Weil pairing or Tate pairing, generalizations of the Diffie-Hellman problem are believed to be computationally infeasible while the simpler Decision Diffie-Hellman problem can be easily solved using the pairing function. The first group is sometimes referred to as a Gap Group because of the assumed difference in difficulty between these two problems in the group.

While first used for cryptanalysis, pairings have since been used to construct many cryptographic systems for which no other efficient implementation is known, such as identity based encryption .

External links

* [http://theory.lcs.mit.edu/classes/6.897/spring04/L25.pdf Lecture on Pairing-Based Cryptography]
* [http://planeta.terra.com.br/informatica/paulobarreto/pblounge.html The Pairing-Based Crypto Lounge]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • ID-based cryptography — Identity based cryptography is a type of public key cryptography in which a publicly known string representing an individual or organization is used as a public key. The public string could include an email address, domain name, or a physical IP… …   Wikipedia

  • Pairing — The concept of pairing treated here occurs in mathematics. Definition Let R be a commutative ring with unity, and let M , N and L be three R modules. A pairing is any R bilinear map e:M imes N o L. That is, it satisfies:e(rm,n)=e(m,rn)=re(m,n)for …   Wikipedia

  • Elliptic curve cryptography — (ECC) is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitz[1] and Victor S. Miller[2] in 1985.… …   Wikipedia

  • Weil pairing — In mathematics, the Weil pairing is a construction of roots of unity by means of functions on an elliptic curve E , in such a way as to constitute a pairing (bilinear form, though with multiplicative notation) on the torsion subgroup of E . The… …   Wikipedia

  • Dan Boneh — Born Israel …   Wikipedia

  • Paulo S. L. M. Barreto — Infobox Person image size = 150px name = Paulo S. L. M. Barreto caption = birth date = residence = flagicon|Brazil São Paulo known for = Cryptographic hash functions, Pairing based cryptography occupation = Professor, University of São Paulo… …   Wikipedia

  • Non-interactive zero-knowledge proof — Non interactive zero knowledge proofs are a variant of zero knowledge proofs. Blum, Feldman, and Micali [1] showed that a common reference string shared between the prover and the verifier is enough to achieve computational zero knowledge without …   Wikipedia

  • Nigel Smart (cryptographer) — Nigel Smart is a professor in the Department of Computer Science at the University of Bristol and a current holder of the Royal Society Wolfson Research Merit Award. He is best known for his work in Elliptic curve cryptography, especially work on …   Wikipedia

  • Victor S. Miller — (b. 3 March, 1947 in Brooklyn, New York, USA) is an American mathematician at the Center for Communications Research of the Institute for Defense Analyses in Princeton, NJ, USA. He received his A.B. in mathematics from Columbia University in 1968 …   Wikipedia

  • Decision Linear assumption — The Decision Linear (DLIN) assumption is a mathematical assumption used in elliptic curve cryptography. In particular, the DLIN assumption is useful in settings where the decisional Diffie–Hellman assumption does not hold (as is often the case in …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”