In this paper we describe a simple protocol for secure delegation of the elliptic-curve pairing. A computationally limited device (typically a smart-card) will delegate the computation of the pairing e(A,B) to a more powerful device (for example a PC), in such a way that 1) the powerful device learns nothing about the points A and B, and 2) the limited device is able to detect when the powerful device is cheating. © IFIP International Federation for Information Processing 2010.
CITATION STYLE
Chevallier-Mames, B., Coron, J. S., McCullagh, N., Naccache, D., & Scott, M. (2010). Secure delegation of elliptic-curve pairing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6035 LNCS, pp. 24–35). https://doi.org/10.1007/978-3-642-12510-2_3
Mendeley helps you to discover research relevant for your work.