Published in

Institute of Electrical and Electronics Engineers, IEEE Transactions on Computers, 9(55), p. 1075-1080, 2006

DOI: 10.1109/tc.2006.134

Links

Tools

Export citation

Search in Google Scholar

A Fault Attack on Pairing-Based Cryptography

Journal article published in 2006 by Dan Page, Frederik Vercauteren
This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Current fault attacks against public key cryptography focus on traditional schemes, such as RSA and ECC, and, to a lesser extent, on primitives such as XTR. However, bilinear maps, or pairings, have presented theorists with a new and increasingly popular way of constructing cryptographic protocols. Most notably, this has resulted in efficient methods for Identity Based Encryption (IBE). Since identity-based cryptography seems an ideal partner for identity aware devices such as smart-cards, in this paper, we examine the security of concrete pairing instantiations in terms of fault attack.