Using abelian varieties to improve pairing-based cryptography
From MaRDI portal
Publication:1027984
DOI10.1007/s00145-008-9022-1zbMath1170.94013OpenAlexW2000898774MaRDI QIDQ1027984
Publication date: 30 June 2009
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-008-9022-1
Cryptography (94A60) Abelian varieties of dimension (> 1) (11G10) Elliptic curves (14H52) Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Related Items (8)
Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves ⋮ Heuristics on pairing-friendly abelian varieties ⋮ Index calculus in the trace zero variety ⋮ Constructing pairing-friendly hyperelliptic curves using Weil restriction ⋮ An optimal representation for the trace zero subgroup ⋮ A New Method for Constructing Pairing-Friendly Abelian Surfaces ⋮ On the Security of Pairing-Friendly Abelian Varieties over Non-prime Fields ⋮ Point compression for the trace zero subgroup over a small degree extension field
Cites Work
- Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem
- The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm
- Adèles and algebraic groups. (Appendix 1: The case of the group \(G_2\), by M. Demazure. Appendix 2: A short survey of subsequent research on Tamagawa numbers, by T. Ono)
- Constructive and destructive facets of Weil descent on elliptic curves
- Short signatures from the Weil pairing
- Group structures of elementary supersingular abelian varieties over finite fields.
- Twisting commutative algebraic groups
- Efficient pairing computation on supersingular abelian varieties
- Endomorphisms of Abelian varieties over finite fields
- Isogeny classes of abelian varieties over finite fields
- Compression in Finite Fields and Torus-Based Cryptography
- The Function Field Sieve in the Medium Prime Case
- Perfect Non-interactive Zero Knowledge for NP
- Compact Group Signatures Without Random Oracles
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Cyclotomic Polynomials and Factorization Theorems
- A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves
- Reducing elliptic curve logarithms to logarithms in a finite field
- Advances in Cryptology - CRYPTO 2003
- On the Minimal Embedding Field
- Algorithmic Number Theory
- Abelian varieties over finite fields
- Theory of Cryptography
- KASH: Recent Developments
- Supersingular Abelian varieties over finite fields
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Using abelian varieties to improve pairing-based cryptography