Maintenant, après ces deux tours d'échanges, les trois protagonistes partagent une même clé sécrète ,
Charlie choisissent leurs clés sécrètes, comme dans le premier cas du schéma de Diffie Hellman, respectivement a, p.1 ,
Bob et Charlie peuvent partager une même clé sécrète comme suit ,
Identity-Based Encryption Gone Wild, Automata, Languages and Programming, 33rd International Colloquium Proceedings, Part II [adv05] Advances in elliptic curve cryptography, pp.300-311, 2005. ,
DOI : 10.1007/11787006_26
Faster explicit formulas for computing pairings over ordinary curves, Advances in Cryptology -EUROCRYPT 2011 -30th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings, pp.48-68, 2011. ,
Faster explicit formulas for computing pairings over ordinary curves, Advances in Cryptology -EUROCRYPT 2011 -30th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings, pp.48-68, 2011. ,
Hierarchical identity based encryption with constant size ciphertext Xavier Boyen, and Hovav Shacham. Short group signatures, Advances in Cryptology -EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings Advances in Cryptology -CRYPTO 2004, 24th Annual International CryptologyConference Proceedings, pp.440-456, 2004. ,
DOI : 10.1007/11426639_26
URL : http://ai.stanford.edu/~xb/eurocrypt05a/eurocrypt05tinyhibe.ps
Identity-based encryption from the weil pairing ,
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto???Naehrig Curves, Pairing-Based Cryptography -Pairing 2010, pp.21-39, 2010. ,
DOI : 10.1007/978-3-642-17455-1_2
The Improbability That an Elliptic Curve Has Subexponential Discrete Log Problem under the Menezes???Okamoto???Vanstone Algorithm, Journal of Cryptology, vol.11, issue.2 ,
DOI : 10.1007/s001459900040
Constructing elliptic curves with prescribed embedding degrees, Security in Communication Networks, Third International Conference, pp.257-267, 2002. ,
On the selection of pairingfriendly groups, Selected Areas in Cryptography, 10th Annual International Workshop , SAC 2003, pp.17-25, 2003. ,
On the Correct Use of the Negation Map in the Pollard rho Method, Public Key Cryptography -PKC 2011 -14th International Conference on Practice and Theory in Public Key Cryptography. Proceedings, pp.128-146, 2011. ,
DOI : 10.1007/978-3-642-19379-8_8
Pairing-friendly elliptic curves of prime order, Selected Areas in Cryptography -SAC 2005, pp.319-331, 2005. ,
Advances in elliptic curve cryptography lecture note series, 2005. ,
Elliptic Curves Suitable for Pairing Based Cryptography, Designs, Codes and Cryptography, vol.2248, issue.5, pp.133-141, 2005. ,
DOI : 10.1007/s10623-004-3808-4
A built-in decisional function and security proof of id-based key agreement protocols from pairings, IACR Cryptology ePrint Archive, p.160, 2006. ,
FPGA implementation of pairings using residue number system and lazy reduction, Cryptographic Hardware and Embedded Systems -CHES 2011 -13th International Workshop. Proceedings, pp.421-441, 2011. ,
Asymmetric Squaring Formulae, 18th IEEE Symposium on Computer Arithmetic (ARITH '07), pp.25-27, 2007. ,
DOI : 10.1109/ARITH.2007.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.162.2383
Faster hashing to g2, Selected Areas in Cryptography -18th International Workshop, pp.412-430, 2011. ,
Faster Pairing Computations on Curves with High-Degree Twists, Public Key Cryptography -PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography. Proceedings, pp.224-242, 2010. ,
DOI : 10.1007/978-3-642-13013-7_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.4568
Identity-based cryptosystems based on the weil pairing, 2001. ,
Memory-saving computation of the pairing final exponentiation on BN curves. Groups Complexity Cryptology New directions in cryptography, IEEE Trans. Information Theory, vol.8, issue.16, pp.75-90, 1976. ,
Choosing and generating parameters for low level pairing implementation on BN curves, IACR Cryptology ePrint Archive, p.1212, 2015. ,
Implementing Cryptographic Pairings over Barreto-Naehrig Curves, Pairing-Based Cryptography -Pairing, pp.197-207, 2007. ,
DOI : 10.1007/978-3-540-73489-5_10
A practical Differential Power Analysis attack against the Miller algorithm, 2009 Ph.D. Research in Microelectronics and Electronics, 2009. ,
DOI : 10.1109/RME.2009.5201339
Implementing cryptographic pairings at standard security levels. CoRR, abs/1407, 2014. ,
DOI : 10.1007/978-3-319-12060-7_3
URL : https://hal.archives-ouvertes.fr/hal-01034213
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems, IEEE Transactions on Information Theory, vol.45, issue.5, pp.1717-1719, 1999. ,
DOI : 10.1109/18.771254
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems, IEEE Transactions on Information Theory, vol.45, issue.5, pp.1717-1719, 1999. ,
DOI : 10.1109/18.771254
A Taxonomy of Pairing-Friendly Elliptic Curves, Journal of Cryptology, vol.2, issue.5, pp.224-280, 2010. ,
DOI : 10.1007/s00145-009-9048-z
Efficient Hardware Implementation of Fp-Arithmetic for Pairing-Friendly Curves, IEEE Transactions on Computers, vol.61, issue.5, pp.61676-685, 2012. ,
DOI : 10.1109/TC.2011.78
Adequate Elliptic Curves for Computing the Product of n Pairings, IACR Cryptology ePrint Archive, vol.52, issue.10, p.472, 2016. ,
DOI : 10.1007/978-3-540-30574-3_20
On the computation of the optimal ate pairing at the 192-bit security level, IACR Cryptology ePrint Archive, p.130, 2016. ,
A family of implementation-friendly BN elliptic curves, Journal of Systems and Software, vol.84, issue.8, pp.1319-1326, 2011. ,
DOI : 10.1016/j.jss.2011.03.083
High Speed Flexible Pairing Cryptoprocessor on FPGA Platform, Pairing-Based Cryptography - Pairing 2010 -4th International Conference Proceedings, pp.450-466, 2010. ,
DOI : 10.1007/978-3-642-17455-1_28
Fault attack, countermeasures on pairing based cryptography. I, J. Network Security, vol.12, issue.1, pp.21-28, 2011. ,
On computing products of pairings, IACR Cryptology ePrint Archive, p.172, 2006. ,
Efficient Non-interactive Proof Systems for Bilinear Groups ,
DOI : 10.1007/978-3-540-78967-3_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.8523
Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions, Public Key Cryptography -PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography Proceedings, pp.209-223, 2010. ,
DOI : 10.1007/978-3-642-13013-7_13
Core Based Architecture to Speed Up Optimal Ate Pairing on FPGA Platform, Pairing-Based Cryptography -Pairing 2012 -5th International Conference, pp.141-159, 2012. ,
DOI : 10.1007/978-3-642-36334-4_9
Probability distributions related to random mappings, Annals of Math. Statistics, pp.1045-1062, 1960. ,
The eta pairing revisited, IEEE Transactions on Information Theory, vol.52, issue.10, pp.4595-4602, 2006. ,
Algorithmes pour résoudre le problème de logarithme discret dans les corps finis, Nouvelles Méthodes Mathématiques en Cryptographie, Fascicule Journées Annuelles Société Mathématiques en Cryptographie, pp.23-53, 2007. ,
A one round protocol for tripartite diffie-hellman, Algorithmic Number Theory, 4th International Symposium, ANTS-IV Proceedings, pp.385-394, 2000. ,
Squaring in cyclotomic subgroups, Mathematics of Computation, vol.82, issue.281, 2013. ,
DOI : 10.1090/S0025-5718-2012-02625-1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.4076
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case, Advances in Cryptology -CRYPTO 2016 - 36th Annual International Cryptology Conference Proceedings, Part I, pp.543-571, 2016. ,
DOI : 10.1007/978-3-662-49890-3_17
URL : https://hal.archives-ouvertes.fr/hal-01281966
Pairing-Based Cryptography at High Security Levels ,
DOI : 10.1007/11586821_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9402
Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field, IACR Cryptology ePrint Archive, p.452, 2007. ,
DOI : 10.1007/978-3-540-85538-5_9
Analysis of the subtractive algorithm for greater common divisors, pp.4720-4722, 1975. ,
Factoring polynomials with rational coefficients, Mathematische Annalen, vol.32, issue.4, pp.515-534, 1982. ,
DOI : 10.1007/BF01457454
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.318
Finite fields, 1994. ,
DOI : 10.1017/CBO9780511525926
Practical validation of several fault attacks against the miller algorithm, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.115-122, 2014. ,
Arithmétique des couplages, performance et résistance aux attaques par cannaux cachés, 2007. ,
New point addition formulae for ECC applications In Arithmetic of Finite Fields, First International Workshop, WAIFI, Proceedings, pp.189-201, 2007. ,
New point addition formulae for ECC applications In Arithmetic of Finite Fields, First International Workshop, WAIFI, Proceedings, pp.189-201, 2007. ,
A survey of fault attacks in pairing based cryptography, Cryptography and Communications, vol.56, issue.1, pp.185-205, 2015. ,
DOI : 10.1007/s12095-014-0114-5
URL : https://hal.archives-ouvertes.fr/hal-01197172
Use of elliptic curves in cryptography In Advances in Cryptology -CRYPTO '85, Proceedings, pp.417-426, 1985. ,
The weil pairing, and its efficient calculation, J. Cryptology, vol.17, issue.4, pp.235-261, 2004. ,
Optimised versions of the ate and twisted ate pairings, Cryptography and Coding, 11th IMA International Conference Proceedings, pp.302-312, 2007. ,
Characterization of Elliptic Curve Traces Under FR-Reduction, Information Security and Cryptology -ICISC 2000, Third International Conference Proceedings, pp.90-108, 2000. ,
DOI : 10.1007/3-540-45247-8_8
Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Transactions on Information Theory, vol.39, issue.5, pp.1639-1646, 1993. ,
DOI : 10.1109/18.259647
Integer variable chi-based ate pairing, Pairing-Based Cryptography - Pairing, pp.178-191, 2008. ,
DOI : 10.1007/978-3-540-85538-5_13
Tate Pairing with Strong Fault Resiliency, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp.103-111, 2007. ,
DOI : 10.1109/FDTC.2007.18
On vectorial addition chains, Journal of Algorithms, vol.2, issue.1, pp.13-21, 1981. ,
DOI : 10.1016/0196-6774(81)90003-1
Monte carlo method for index computations (mod p), 1978. ,
Counting points on elliptic curves over finite fields, Journal de Th??orie des Nombres de Bordeaux, vol.7, issue.1, 1995. ,
DOI : 10.5802/jtnb.142
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.4044
Sage Mathematics Software (Version SageMathCloud) The Sage Development Team, 2015. ,
On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves, Pairing-Based Cryptography -Pairing 2009, Third International Conference Proceedings, pp.78-88, 2009. ,
DOI : 10.1007/3-540-36400-5_24
Computing the tate pairing The Cryptographers' Track at the RSA Conference, Topics in Cryptology -CT-RSA 2005 Proceedings, pp.293-304, 2005. ,
Sylvain Duquesne, and Mohsen Machhout. Area-efficient hardware implementation of the optimal ate pairing over BN curves, IACR Cryptology ePrint Archive, p.1100, 2015. ,
The arithmetic of elliptic curves. Graduate texts in mathematics ,
Efficient Pairings and ECC for Embedded Systems, Cryptographic Hardware and Embedded Systems -CHES 2014, pp.298-315, 2014. ,
DOI : 10.1007/978-3-662-44709-3_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.690.2083
Optimal Pairings, IEEE Transactions on Information Theory, vol.56, issue.1, pp.455-461, 2010. ,
DOI : 10.1109/TIT.2009.2034881
Elliptic curves, number theory and cryptography, 2003. ,
Elliptic Curves, Number Theory and Cryptography, Discrete Math .Aplli, Chapman and Hall, 2008. ,
Efficient Identity-Based Encryption Without Random Oracles, Advances in Cryptology -EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.114-127, 2005. ,
DOI : 10.1007/11426639_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.2190
Analysis of Optimum Pairing Products at High Security Levels, Progress in Cryptology -INDOCRYPT 2012, 13th International Conference on Cryptology in India Proceedings, pp.412-430, 2012. ,
DOI : 10.1007/978-3-642-34931-7_24