Cargando…
Report on Pairing-based Cryptography
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews t...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
[Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730686/ https://www.ncbi.nlm.nih.gov/pubmed/26958435 http://dx.doi.org/10.6028/jres.120.002 |
_version_ | 1782412446787436544 |
---|---|
author | Moody, Dustin Peralta, Rene Perlner, Ray Regenscheid, Andrew Roginsky, Allen Chen, Lily |
author_facet | Moody, Dustin Peralta, Rene Perlner, Ray Regenscheid, Andrew Roginsky, Allen Chen, Lily |
author_sort | Moody, Dustin |
collection | PubMed |
description | This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed. |
format | Online Article Text |
id | pubmed-4730686 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology |
record_format | MEDLINE/PubMed |
spelling | pubmed-47306862016-03-08 Report on Pairing-based Cryptography Moody, Dustin Peralta, Rene Perlner, Ray Regenscheid, Andrew Roginsky, Allen Chen, Lily J Res Natl Inst Stand Technol Article This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed. [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology 2015-02-03 /pmc/articles/PMC4730686/ /pubmed/26958435 http://dx.doi.org/10.6028/jres.120.002 Text en https://creativecommons.org/publicdomain/zero/1.0/ The Journal of Research of the National Institute of Standards and Technology is a publication of the U.S. Government. The papers are in the public domain and are not subject to copyright in the United States. Articles from J Res may contain photographs or illustrations copyrighted by other commercial organizations or individuals that may not be used without obtaining prior approval from the holder of the copyright. |
spellingShingle | Article Moody, Dustin Peralta, Rene Perlner, Ray Regenscheid, Andrew Roginsky, Allen Chen, Lily Report on Pairing-based Cryptography |
title | Report on Pairing-based Cryptography |
title_full | Report on Pairing-based Cryptography |
title_fullStr | Report on Pairing-based Cryptography |
title_full_unstemmed | Report on Pairing-based Cryptography |
title_short | Report on Pairing-based Cryptography |
title_sort | report on pairing-based cryptography |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730686/ https://www.ncbi.nlm.nih.gov/pubmed/26958435 http://dx.doi.org/10.6028/jres.120.002 |
work_keys_str_mv | AT moodydustin reportonpairingbasedcryptography AT peraltarene reportonpairingbasedcryptography AT perlnerray reportonpairingbasedcryptography AT regenscheidandrew reportonpairingbasedcryptography AT roginskyallen reportonpairingbasedcryptography AT chenlily reportonpairingbasedcryptography |