Keyword : pairing


Efficient Inner Product Functional Encryption with Full-Hiding Security
Junichi TOMIDA Masayuki ABE Tatsuaki OKAMOTO 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1 ; pp. 33-40
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
functional encryptioninner productfunction privacypairing
 Summary | Full Text:PDF

An Efficient Blacklistable Anonymous Credentials without TTP of Tracing Authority Using Pairing-Based Accumulator
Yuu AIKOU Shahidatul SADIAH Toru NAKANISHI 
Publication:   
Publication Date: 2019/12/01
Vol. E102-A  No. 12 ; pp. 1968-1979
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
authenticationanonymityblacklistpairing
 Summary | Full Text:PDF

Speeding Up Revocable Group Signature with Compact Revocation List Using Vector Commitments
Yasuyuki SEITA Toru NAKANISHI 
Publication:   
Publication Date: 2019/12/01
Vol. E102-A  No. 12 ; pp. 1676-1687
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
anonymitygroup signaturesrevocationpairing
 Summary | Full Text:PDF

Opcount: A Pseudo-Code Performance Estimation System for Pairing-Based Cryptography
Masayuki ABE Fumitaka HOSHINO Miyako OHKUBO 
Publication:   
Publication Date: 2019/09/01
Vol. E102-A  No. 9 ; pp. 1285-1292
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
pairingperformance estimationbenchmarktight security
 Summary | Full Text:PDF

Two-Step Pairing Algorithm for Target Range and Velocity Detection in FMCW Automotive Radar
Eugin HYUN Woojin OH Jong-Hun LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/03/01
Vol. E98-A  No. 3 ; pp. 801-810
Type of Manuscript:  PAPER
Category: Digital Signal Processing
Keyword: 
FMCW radarpairingmulti-targettwo-stepdetection algorithmdetection probability
 Summary | Full Text:PDF

A Note on the Pairing Computation Using Normalized Miller Functions
Naoki OGURA Shigenori UCHIYAMA Naoki KANAYAMA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 196-203
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics
Keyword: 
pairingMiller's algorithmrational functionsnormalization
 Summary | Full Text:PDF

Universal Construction of a 12th Degree Extension Field for Asymmetric Pairing
Masaaki SHIRASE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 156-164
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics
Keyword: 
pairingBarreto-Naehrig curveextension fieldquadratic residuecubic residueEuler's conjecture
 Summary | Full Text:PDF

Pairing-Friendly Elliptic Curves with Various Discriminants
Woo Sug KANG Ki Taek KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6 ; pp. 1032-1038
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
pairingpairing-friendly elliptic curvesembedding degreeBrezing-Weng method
 Summary | Full Text:PDF

The Vector Decomposition Problem
Maki YOSHIDA Shigeo MITSUNARI Toru FUJIWARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 188-193
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics
Keyword: 
computational problemvector decomposition problemcomputational Diffie-Hellman problemelliptic curvepairing
 Summary | Full Text:PDF

Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing
Toshiya NAKAJIMA Tetsuya IZU Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9 ; pp. 2379-2386
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
pairingsoftware implementationirreducible polynomialreduction optimal trinomialcharacteristic threefinite field
 Summary | Full Text:PDF

An ID-SP-M4M Scheme and Its Security Analysis
Lihua WANG Eiji OKAMOTO Ying MIAO Takeshi OKAMOTO Hiroshi DOI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 91-100
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Signatures
Keyword: 
series-parallel multisignaturepairingID-basedBDH assumption
 Summary | Full Text:PDF

Scaling Security of Elliptic Curves with Fast Pairing Using Efficient Endomorphisms
Katsuyuki TAKASHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 152-159
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
elliptic curve cryptographypairingID-based cryptography
 Summary | Full Text:PDF

Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses
Lihua WANG Zhenfu CAO Takeshi OKAMOTO Ying MIAO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 106-114
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
proxy cryptosystempairingauthorization-limitedtransformation-freeBDH assumption
 Summary | Full Text:PDF

Identity-Based Key Agreement for Peer Group Communication from Pairings
Shyi-Tsong WU Jung-Hui CHIU Bin-Chang CHIEU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/10/01
Vol. E88-A  No. 10 ; pp. 2762-2768
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
identity-basedpairinggroup key agreementelliptic curve cryptography
 Summary | Full Text:PDF