Guide to pairing-based cryptography (Q2832131)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Guide to pairing-based cryptography |
scientific article; zbMATH DE number 6648355
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Guide to pairing-based cryptography |
scientific article; zbMATH DE number 6648355 |
Statements
7 November 2016
0 references
pairing-based cryptography
0 references
finite fields
0 references
elliptic curves
0 references
pairing-friendly elliptic curves
0 references
Weil pairing
0 references
Tate pairing
0 references
scalar multiplication
0 references
exponentiation
0 references
final exponentiation
0 references
hashing
0 references
DLP
0 references
parameters
0 references
implementations
0 references
attacks
0 references
0 references
0 references
0 references
0.8837931
0 references
0 references
Guide to pairing-based cryptography (English)
0 references
The book is divided into twelve chapters each of them written by a different authors. Within each chapter one can find its own references. Nevertheless all chapter are connected and guided by a common goal, introduce, explain and describe the main ingredients in pairing-based cryptography.NEWLINENEWLINEFirst chapter is a elementary introduction to pairing-based cryptography. Second chapter provides the necessary tools to understand the book, essentially finite fields and elliptic curves. Third chapter explains in details the more important pairings, Weil and Tate Pairings. Moreover, they provide some techniques to speed such a pairings. Four Chapter explain how to find elliptic curves suitable for pairing-based cryptography. Chapter five introduces the arithmetic of finite fields with the aim of optimize all the computations. In chapter six scalar multiplication and exponentiation in pairings groups is explained in an optimal way in order to enhance the performance of group operations that are not the pairing computation. In chapter seven several techniques that reduce the computational cost of the final exponentiation are explained, this is one of the main steps in Tate pairing. Chapter eight provides practical, efficient and secure algorithms for hashing values to elliptic curve subgroups. In chapter nine the Discrete Logarithm Problem (DLP) is discussed, the commonly groups used and the algorithms available to compute DLP. Chapter ten explains how to construct and choose the parameters necessary to implement a pairing. Chapter eleven explains how to optimize software implementations for pairing-based cryptography. For it is necessary to reduce finite fields operations and implement finite fields and big-integers operations efficiently. Chapter twelve explains side channel attacks and fault attacks and also provides possible countermeasures against them.NEWLINENEWLINENEWLINETABLE OF CONTENTS:NEWLINENEWLINENEWLINE1) Pairing-Based Cryptography.NEWLINENEWLINE2) Mathematical Background.NEWLINENEWLINE3) Pairings.NEWLINENEWLINE4) Pairing-Friendly Elliptic Curves.NEWLINENEWLINE5) Arithmetic of Finite Fields.NEWLINENEWLINE6) Scalar Multiplication and Exponentiation in Pairing Groups.NEWLINENEWLINE7) Final Exponentiation.NEWLINENEWLINE8) Hashing into Elliptic curves.NEWLINENEWLINE9) Discrete Logarithms.NEWLINENEWLINE10) Choosing parameters.NEWLINENEWLINE11) Software implementations.NEWLINENEWLINE12) Physical Attacks.
0 references