Content deleted Content added
→External links: removed dead link |
|||
Line 22:
For example, in groups equipped with a [[bilinear mapping]] such as the [[Weil pairing]] or [[Tate pairing]], generalizations of the [[Diffie–Hellman problem|computational Diffie–Hellman problem]] are believed to be infeasible while the simpler [[decisional Diffie–Hellman assumption|decisional Diffie–Hellman problem]] can be easily solved using the pairing function. The first group is sometimes referred to as a '''Gap Group''' because of the assumed difference in difficulty between these two problems in the group.
While first used for [[Menezes-Okamato-Vanstone attack|cryptanalysis]],<ref>{{cite journal|last1=Menezes|first1=Alfred J. Menezes|last2=Okamato|first2=Tatsuaki|last3=Vanstone|first3=Scott A.|title=Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field|journal=IEEE Transactions
A contemporary example of using bilinear pairings is exemplified in the [[Boneh-Lynn-Shacham]] signature scheme.
Line 42:
[[Category:Elliptic curve cryptography]]
[[Category:Pairing-based cryptography| ]]
|