Cargando…

Report on Pairing-based Cryptography

This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews t...

Descripción completa

Detalles Bibliográficos
Autores principales: Moody, Dustin, Peralta, Rene, Perlner, Ray, Regenscheid, Andrew, Roginsky, Allen, Chen, Lily
Formato: Online Artículo Texto
Lenguaje:English
Publicado: [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730686/
https://www.ncbi.nlm.nih.gov/pubmed/26958435
http://dx.doi.org/10.6028/jres.120.002
_version_ 1782412446787436544
author Moody, Dustin
Peralta, Rene
Perlner, Ray
Regenscheid, Andrew
Roginsky, Allen
Chen, Lily
author_facet Moody, Dustin
Peralta, Rene
Perlner, Ray
Regenscheid, Andrew
Roginsky, Allen
Chen, Lily
author_sort Moody, Dustin
collection PubMed
description This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed.
format Online
Article
Text
id pubmed-4730686
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology
record_format MEDLINE/PubMed
spelling pubmed-47306862016-03-08 Report on Pairing-based Cryptography Moody, Dustin Peralta, Rene Perlner, Ray Regenscheid, Andrew Roginsky, Allen Chen, Lily J Res Natl Inst Stand Technol Article This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed. [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology 2015-02-03 /pmc/articles/PMC4730686/ /pubmed/26958435 http://dx.doi.org/10.6028/jres.120.002 Text en https://creativecommons.org/publicdomain/zero/1.0/ The Journal of Research of the National Institute of Standards and Technology is a publication of the U.S. Government. The papers are in the public domain and are not subject to copyright in the United States. Articles from J Res may contain photographs or illustrations copyrighted by other commercial organizations or individuals that may not be used without obtaining prior approval from the holder of the copyright.
spellingShingle Article
Moody, Dustin
Peralta, Rene
Perlner, Ray
Regenscheid, Andrew
Roginsky, Allen
Chen, Lily
Report on Pairing-based Cryptography
title Report on Pairing-based Cryptography
title_full Report on Pairing-based Cryptography
title_fullStr Report on Pairing-based Cryptography
title_full_unstemmed Report on Pairing-based Cryptography
title_short Report on Pairing-based Cryptography
title_sort report on pairing-based cryptography
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730686/
https://www.ncbi.nlm.nih.gov/pubmed/26958435
http://dx.doi.org/10.6028/jres.120.002
work_keys_str_mv AT moodydustin reportonpairingbasedcryptography
AT peraltarene reportonpairingbasedcryptography
AT perlnerray reportonpairingbasedcryptography
AT regenscheidandrew reportonpairingbasedcryptography
AT roginskyallen reportonpairingbasedcryptography
AT chenlily reportonpairingbasedcryptography