Updating key size estimations for pairings

From MaRDI portal
Publication:2010589

DOI10.1007/s00145-018-9280-5zbMath1435.94122OpenAlexW2790485266MaRDI QIDQ2010589

Razvan Barbulescu, Sylvain Duquesne

Publication date: 27 November 2019

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-018-9280-5



Related Items

Hashing to elliptic curves of \(j\)-invariant 1728, Multi-party revocation in sovrin: performance through distributed trust, Efficient hash maps to \(\mathbb{G}_2\) on BLS curves, LOVE a pairing, Fine-grained forward secrecy: allow-list/deny-list encryption and applications, Faster beta Weil pairing on BLS pairing friendly curves with odd embedding degree, Families of SNARK-friendly 2-chains of elliptic curves, Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation, A survey of elliptic curves for proof systems, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Fast subgroup membership testings for \(\mathbb{G}_1, \mathbb{G}_2\) and \(\mathbb{G}_T\) on pairing-friendly curves, A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation, The state of the union: union-only signatures for data aggregation, Higher-dimensional sieving for the number field sieve algorithms, Finite field arithmetic in large characteristic for classical and post-quantum cryptography, New versions of Miller-loop secured against side-channel attacks, Tower building technique on elliptic curve with embedding degree 18, Improving the efficiency of re-randomizable and replayable CCA secure public key encryption, Fast, compact, and expressive attribute-based encryption, Computing discrete logarithms in \(\mathbb F_{p^6}\), Compact structure-preserving signatures with almost tight security, Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange, A short-list of pairing-friendly curves resistant to special TNFS at the 128-bit security level, Group signatures with user-controlled and sequential linkability, Beta Weil pairing revisited, Identity-based authenticated encryption with identity confidentiality, Hardware implementation of multiplication over quartic extension fields, Still wrong use of pairings in cryptography



Cites Work