Cryptology ePrint Archive: Report 2002/008
Efficient Algorithms for Pairing-Based Cryptosystems
Speeding up Elliptic Curve Scalar Multiplication without Precomputation
This paper presents a series of Montgomery scalar multiplication
algorithms on general short Weierstrass curves over odd characteristic
fields, which need only 12 field multiplications plus 12 ~ 20 field
additions per scalar bit using 8 ~ 10 field registers, thus significantly
outperform the binary NAF method on average.
crypto  ecc 
5 days ago
draft-goldbe-vrf-01 - Verifiable Random Functions (VRFs)
A Verifiable Random Function (VRF) is the public-key version of a keyed cryptographic hash. Only the holder of the private key can compute the hash, but anyone with public key can verify the correctness of the hash. VRFs are useful for preventing enumeration of hash-based data structures. This document specifies several VRF constructions that are secure in the cryptographic random oracle model. One VRF uses RSA and the other VRF uses Eliptic Curves (EC).
10 days ago
Cryptology ePrint Archive: Report 2017/240
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
march 2017
[1702.07588] Practical Homomorphic Encryption Over the Integers
We present novel homomorphic encryption schemes for integer arithmetic, intended for use in secure single-party computation in the cloud. These schemes are capable of securely computing only low degree polynomials homomorphically, but this appears sufficient for most practical applications. In this setting, our schemes lead to practical key and ciphertext sizes. We present a sequence of generalisations of our basic schemes, with increasing levels of security, but decreasing practicality. We have evaluated the first four of these algorithms by computing a low-degree inner product. The timings of these computations are extremely favourable. Finally, we use our ideas to derive a fully homomorphic system, which appears impractical, but can homomorphically evaluate arbitrary Boolean circuits.
february 2017
Cryptology ePrint Archive: Report 2017/141
In this paper we seek for a more flexible, yet secure, GPAKE and put forward the notion of partitioned GPAKE. Partitioned GPAKE tolerates users that run the protocol on different passwords. Through a protocol run, any subgroup of users that indeed share a password, establish a session key, factoring out the ``noise'' of inputs by users holding different passwords.
pake  crypto 
february 2017
« earlier      
actors advice aes agriculture ai algorithm altivec analysis apache api apple architecture arm art article asio asn.1 assembler awesome beer bitcoin blog book books boost botan brewing business c c# c++ c++11 cache capabilities cell china clang clojure cluster code coffee comic compiler compilers computers concurrency conference corruption cpu crypto cs cuda culture database datastructures dc debugging design dht distributed diy django documentation e ecc economics economy education electronics energy environment erlang essay farm farming fiction filesystem filter finance firefox food fp framework functional funny games gardening gcc gentoo git google government graphics grimmeathookfuture gtd gui hardware hashfunction haskell health history hosting housing howto humor ibm ietf intel interesting internet interview investing ipod java javascript json jvm kernel language law learning library life lifehacks linux lisp logic mail management manual map maple maps math mceliece medicine memcached memory messaging microsoft military money monotone multicore music network networking news nist nsa nyc ocaml oil opensource operatingsystem optimization organization p2p pairings paper papers parallel parser parsing patterns paulgraham paxos peakoil people performance perl philosophy photo photography physics pki policestate politics postfix powerpc pqcrypto prion privacy productivity programming protocol psychology python radio recipe reference reviews rfc rng rsa ruby running scala scheme science scifi search security serialization server sgx shopping sidechannel simd singularity society software space spam specification sql ssl standard statistics stm storage surveillance sysadmin systems tahoe tcp technology terrorism testing theory threads tls tool toolbox tools toreview tpm travel tutorial unix usa verification vermont versioncontrol via:cryptogon video visualization web web2.0 webserver windows work writing x11 x509 x86

Copy this bookmark: