Back to Results
First PageMeta Content
Digital signature / Diffie–Hellman problem / Signcryption / Group signature / Blind signature / ID-based encryption / RSA / Pairing / Diffie–Hellman key exchange / Cryptography / BLS / Decisional Diffie–Hellman assumption


Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]
Add to Reading List

Document Date: 2004-06-24 08:19:14


Open Document

File Size: 281,48 KB

Share Result on Facebook

City

Pairing / /

Company

G2 / G1 / Oracle / GT / /

Currency

pence / /

/

IndustryTerm

certificate-based public key infrastructure / aggregate verification algorithm / secure border gateway protocol / cryptographic protocols / agreement protocols / mobile communications / blind signature protocol / probabilistic polynomial-time algorithm / bank / prime order / optimistic contract signing protocols / polynomial-time algorithm / blind signature protocols / additive / public aggregation algorithm / electronic payment systems / miscellaneous applications / additive groups / shared object systems / mobile agent applications / important and useful cryptographic tool / multiplicative / /

Organization

Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit / /

Person

Rana Barua / /

Position

group manager / /

Product

Franklin / /

Technology

aggregate verification algorithm / Encryption / cryptography / public key infrastructure / Dual-Hierarchical-Identity-Based Encryption / secure border gateway protocol / public key / public aggregation algorithm / 6 2.1 2.2 2.3 3 Encryption / Hierarchical ID-Based Encryption / Three Party Key Agreement Protocol / blind signature protocols / PKI / polynomial-time algorithm / ID-based public key encryption / Searchable Public Key Encryption / SDH / private key / secret key / Collusion Attack Algorithm / probabilistic polynomial-time algorithm / DLP / digital cash / key agreement protocols / ID-based encryption / cryptographic protocols / 0/1-valued algorithm / optimistic contract signing protocols / blind signature protocol / public key encryption / /

SocialTag