Cargando…

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to di...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Maocai, Dai, Guangming, Choo, Kim-Kwang Raymond, Jayaraman, Prem Prakash, Ranjan, Rajiv
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5001717/
https://www.ncbi.nlm.nih.gov/pubmed/27564373
http://dx.doi.org/10.1371/journal.pone.0161857