UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

IEEE 1363.3

Identity-Based Cryptographic Techniques using Pairings

active, Most Current
Buy Now
Organization: IEEE
Publication Date: 22 August 2013
Status: active
Page Count: 151
scope:

This document specifies identity-based cryptographic schemes based on the bilinear mappings over elliptic curves known as pairings. Specific techniques include algorithms to compute the pairings and specification of recommended elliptic curves and curve parameters over which the pairings are defined. The class of computer and communications systems is not restricted.

Purpose The proliferation of electronic communication and the Internet brings with it the need for privacy and data protection. Public-key cryptography offers fundamental technology addressing this need. Many alternative public-key techniques have been proposed, each with its own benefits. IEEE Std 1363TM-20001 and IEEE Std 1363aTM-2004 have produced a comprehensive reference defining a range of common public-key techniques covering key agreement, public-key encryption, and digital signatures from several families, namely the discrete logarithm, integer factorization, and elliptic curve families. This document will specify identity-based cryptographic techniques based on pairings. These offer advantages over classic public-key techniques specified in IEEE Std 1363-2000. Examples are the lack of a requirement to exchange or look up public keys of a recipient and the simplified use of short-lived keys. The class of computer and communications systems is not restricted.

1 Information on references can be found in Clause 2.

Document History

IEEE 1363.3
August 22, 2013
Identity-Based Cryptographic Techniques using Pairings
This document specifies identity-based cryptographic schemes based on the bilinear mappings over elliptic curves known as pairings. Specific techniques include algorithms to compute the pairings and...

References

Advertisement