This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730686PMC
http://dx.doi.org/10.6028/jres.120.002DOI Listing

Publication Analysis

Top Keywords

pairing-based cryptography
20
cryptography schemes
12
pairings includes
8
cryptographic schemes
8
report
7
schemes
7
pairing-based
6
cryptography
5
study
5
report pairing-based
4

Similar Publications

Revocable Signature Scheme with Implicit and Explicit Certificates.

Entropy (Basel)

September 2023

Department of Microelectronics and Computer Science, Lodz University of Technology, 93-005 Lodz, Poland.

This paper addresses the certificate revocation problem and proposes the first revocable pairing-based signature scheme with implicit and explicit certificates (IE-RCBS-kCAA). We should no longer discuss whether to revoke certificates but how to do it effectively, ensuring both the scalability of the revocation operation and the non-repudiation of the signature in the short or long term. Under the computational difficulty assumptions of the modified collusion attack algorithm with traitors (-mCAA) and discrete logarithm (DL) problems, we demonstrate that our scheme is secure against existential unforgeability under chosen message attacks (EUF-IERCBS-kCAA-CMA) in a random oracle model.

View Article and Find Full Text PDF

Current cloud computing causes serious restrictions to safeguarding users' data privacy. Since users' sensitive data is submitted in unencrypted forms to remote machines possessed and operated by untrusted service providers, users' sensitive data may be leaked by service providers. Program obfuscation shows the unique advantages that it can provide for cloud computing.

View Article and Find Full Text PDF

Monitoring location updates from mobile users has important applications in many areas, ranging from public health (e.g., COVID-19 contact tracing) and national security to social networks and advertising.

View Article and Find Full Text PDF

Identity-Based Key Exchange on In-Vehicle Networks: CAN-FD & FlexRay.

Sensors (Basel)

November 2019

Faculty of Automatics and Computers, Politehnica University of Timisoara, Timisoara 300223, Romania.

Security has become critical for in-vehicle networks as they carry safety-critical data from various components, e.g., sensors or actuators, and current research proposals were quick to react with cryptographic protocols designed for in-vehicle buses, e.

View Article and Find Full Text PDF

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

Sensors (Basel)

June 2017

Harbin Institute of Technology Shenzhen Graduate School, Shenzhen University Town, Xili, Nanshan District, Shenzhen 518055, China.

In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!