Paulo S. L. M. Barreto
University of São Paulo
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Paulo S. L. M. Barreto.
international conference on selected areas in cryptography | 2005
Paulo S. L. M. Barreto; Michael Naehrig
Previously known techniques to construct pairing-friendly curves of prime or near-prime order are restricted to embedding degree
Designs, Codes and Cryptography | 2007
Paulo S. L. M. Barreto; Steven D. Galbraith; Colm Ó hÉigeartaigh; Michael Scott
k \leqslant 6
the cryptographers track at the rsa conference | 2005
Noel McCullagh; Paulo S. L. M. Barreto
. More general methods produce curves over
international conference on the theory and application of cryptology and information security | 2005
Paulo S. L. M. Barreto; Benoît Libert; Noel McCullagh; Jean-Jacques Quisquater
{\mathbb F}_{p}
selected areas in cryptography | 2003
Paulo S. L. M. Barreto; Ben Lynn; Michael Scott
where the bit length of p is often twice as large as that of the order r of the subgroup with embedding degree k; the best published results achieve ρ ≡ log(p)/log(r) ~ 5/4. In this paper we make the first step towards surpassing these limitations by describing a method to construct elliptic curves of prime order and embedding degree k = 12. The new curves lead to very efficient implementation: non-pairing operations need no more than
Computer Networks | 2010
Marcos A. Simplício; Paulo S. L. M. Barreto; Cintia B. Margi; Tereza Cristina M. B. Carvalho
{\mathbb F}_{p^4}
Journal of Cryptology | 2004
Paulo S. L. M. Barreto; Ben Lynn; Michael Scott
arithmetic, and pairing values can be compressed to one third of their length in a way compatible with point reduction techniques. We also discuss the role of large CM discriminants D to minimize ρ; in particular, for embedding degree k = 2q where q is prime we show that the ability to handle log(D)/log(r) ~ (q–3)/(q–1) enables building curves with ρ ~ q/(q–1).
selected areas in cryptography | 2009
Rafael Misoczki; Paulo S. L. M. Barreto
We present a general technique for the efficient computation of pairings on Jacobians of supersingular curves. This formulation, which we call the eta pairing, generalizes results of Duursma and Lee for computing the Tate pairing on supersingular elliptic curves in characteristic 3. We then show how our general technique leads to a new algorithm which is about twice as fast as the Duursma–Lee method. These ideas are applied to elliptic and hyperelliptic curves in characteristic 2 with very efficient results. In particular, the hyperelliptic case is faster than all previously known pairing algorithms.
international symposium on information theory | 2013
Rafael Misoczki; Jean-Pierre Tillich; Nicolas Sendrier; Paulo S. L. M. Barreto
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorithm first proposed by Sakai and Kasahara. We show how this key agreement can be used in either escrowed or escrowless mode. We also describe conditions under which users of different Key Generation Centres can agree on a shared secret key. We give an overview of existing two-party key agreement protocols, and compare our new scheme with existing ones in terms of computational cost and storage requirements.
Journal of Systems and Software | 2011
Geovandro C. C. F. Pereira; Marcos A. Simplicio; Michael Naehrig; Paulo S. L. M. Barreto
In this paper we describe a new identity-based signcryption (IBSC) scheme built upon bilinear maps. This scheme turns out to be more efficient than all others proposed so far. We prove its security in a formal model under recently studied computational assumptions and in the random oracle model. As a result of independent interest, we propose a new provably secure identity-based signature (IBS) scheme that is also faster than all known pairing-based IBS methods.