Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-r5zm4 Total loading time: 0 Render date: 2024-07-03T04:28:42.994Z Has data issue: false hasContentIssue false

Chapter X - Cryptography from Pairings

Published online by Cambridge University Press:  20 August 2009

Ian F. Blake
Affiliation:
University of Toronto
Gadiel Seroussi
Affiliation:
Hewlett-Packard Laboratories, Palo Alto, California
Nigel P. Smart
Affiliation:
Hewlett-Packard Laboratories, Bristol
Get access

Summary

Introduction

This chapter presents a survey of positive applications of pairings in cryptography. We assume the reader has a basic understanding of concepts from cryptography such as public-key encryption, digital signatures, and key exchange protocols. A solid grounding in the general area of cryptography can be obtained by reading [240].

We will attempt to show how pairings (as described in Chapter IX) have been used to construct a wide range of cryptographic schemes, protocols and infrastructures supporting the use of public-key cryptography. Recent years have seen an explosion of interest in this topic, inspired mostly by three key contributions: Sakai, Ohgishi and Kasahara's early and much overlooked work introducing pairing-based key agreement and signature schemes [284]; Joux's three-party key agreement protocol as presented in [183]; and Boneh and Franklin's identity-based encryption (IBE) scheme built from pairings [38]. The work of Verheul [335] has also been influential because it eases the cryptographic application of pairings. We will give detailed descriptions of these works as the chapter unfolds. To comprehend the rate of increase of research in this area, note that the bibliography of an earlier survey [273] written in mid-2002 contains 28 items, while, at the time of writing in early 2004, Barreto's website [15] lists over 100 research papers.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2005

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×