Verifiable pairing and its applications

10Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Pairing-based cryptography is rapidly emerging in recent years. Many cryptographic protocols, such as signcryption, threshold decryption and undeniable signature enabled by pairing require sending the result of the pairing function with private key as one of the input. Since private key is only known to its owner, the correctness of the result may not be easily verifiable (which requires solving the decisional bilinear Diffie-Hellman problem). In this paper, we introduce the notion of Verifiable Pairing, together with a concrete construction, to ensure the robustness of these protocols. Verifiable pairing is a useful primitive in many information security applications. As examples, we show how verifiable pairing can be applied in signcryption, threshold decryption and how it can help in fixing insecure protocol. In adding verifiability to threshold decryption, our solution is more efficient than the previous proposal in [21]. As a bonus result, we find that our scheme for verifiable pairing gives rise to a new identity-based signature that is provably secure in the random oracle model without using the forking lemma, assuming the hardness of the computational bilinear Diffie-Hellman problem. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Chow, S. S. M. (2005). Verifiable pairing and its applications. In Lecture Notes in Computer Science (Vol. 3325, pp. 170–187). Springer Verlag. https://doi.org/10.1007/978-3-540-31815-6_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free