Exponentiating in Pairing Groups

We study exponentiations in pairing groups for the most common security levels and show that, although the Weierstrass model is preferable for pairing computation, it can be worthwhile to map to alternative curve representations for the non-pairing group operations in protocols.

PDF file

In  Selected Areas in Cryptography 2013 (SAC 2013)

Publisher  Springer


> Publications > Exponentiating in Pairing Groups