Chapter 22 Pairing-Based Cryptography
As we pointed out in the previous chapter, elliptic curves have various advantages in cryptosystems based on discrete logs. However, as we’ll see in this chapter, they also open up exciting new vistas for cryptographic applications. The existence of a bilinear pairing on certain elliptic curves is what makes this possible.
First, we’ll describe one of these pairings. Then we’ll give various applications, including identity-based encryption, digital signatures, and encrypted keyword searches.
Get Introduction to Cryptography with Coding Theory, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.