Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Paulo S. L. M. Barreto is active.

Publication


Featured researches published by Paulo S. L. M. Barreto.


international conference on selected areas in cryptography | 2005

Pairing-Friendly elliptic curves of prime order

Paulo S. L. M. Barreto; Michael Naehrig

Previously known techniques to construct pairing-friendly curves of prime or near-prime order are restricted to embedding degree


Designs, Codes and Cryptography | 2007

Efficient pairing computation on supersingular Abelian varieties

Paulo S. L. M. Barreto; Steven D. Galbraith; Colm Ó hÉigeartaigh; Michael Scott

k \leqslant 6


the cryptographers track at the rsa conference | 2005

A new two-party identity-based authenticated key agreement

Noel McCullagh; Paulo S. L. M. Barreto

. More general methods produce curves over


international conference on the theory and application of cryptology and information security | 2005

Efficient and provably-secure identity-based signatures and signcryption from bilinear maps

Paulo S. L. M. Barreto; Benoît Libert; Noel McCullagh; Jean-Jacques Quisquater

{\mathbb F}_{p}


selected areas in cryptography | 2003

On the Selection of Pairing-Friendly Groups

Paulo S. L. M. Barreto; Ben Lynn; Michael Scott

where the bit length of p is often twice as large as that of the order r of the subgroup with embedding degree k; the best published results achieve ρ ≡ log(p)/log(r) ~ 5/4. In this paper we make the first step towards surpassing these limitations by describing a method to construct elliptic curves of prime order and embedding degree k = 12. The new curves lead to very efficient implementation: non-pairing operations need no more than


Computer Networks | 2010

A survey on key management mechanisms for distributed Wireless Sensor Networks

Marcos A. Simplício; Paulo S. L. M. Barreto; Cintia B. Margi; Tereza Cristina M. B. Carvalho

{\mathbb F}_{p^4}


Journal of Cryptology | 2004

Efficient Implementation of Pairing-Based Cryptosystems

Paulo S. L. M. Barreto; Ben Lynn; Michael Scott

arithmetic, and pairing values can be compressed to one third of their length in a way compatible with point reduction techniques. We also discuss the role of large CM discriminants D to minimize ρ; in particular, for embedding degree k = 2q where q is prime we show that the ability to handle log(D)/log(r) ~ (q–3)/(q–1) enables building curves with ρ ~ q/(q–1).


selected areas in cryptography | 2009

Compact McEliece Keys from Goppa Codes

Rafael Misoczki; Paulo S. L. M. Barreto

We present a general technique for the efficient computation of pairings on Jacobians of supersingular curves. This formulation, which we call the eta pairing, generalizes results of Duursma and Lee for computing the Tate pairing on supersingular elliptic curves in characteristic 3. We then show how our general technique leads to a new algorithm which is about twice as fast as the Duursma–Lee method. These ideas are applied to elliptic and hyperelliptic curves in characteristic 2 with very efficient results. In particular, the hyperelliptic case is faster than all previously known pairing algorithms.


international symposium on information theory | 2013

MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes

Rafael Misoczki; Jean-Pierre Tillich; Nicolas Sendrier; Paulo S. L. M. Barreto

We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorithm first proposed by Sakai and Kasahara. We show how this key agreement can be used in either escrowed or escrowless mode. We also describe conditions under which users of different Key Generation Centres can agree on a shared secret key. We give an overview of existing two-party key agreement protocols, and compare our new scheme with existing ones in terms of computational cost and storage requirements.


Journal of Systems and Software | 2011

A family of implementation-friendly BN elliptic curves

Geovandro C. C. F. Pereira; Marcos A. Simplicio; Michael Naehrig; Paulo S. L. M. Barreto

In this paper we describe a new identity-based signcryption (IBSC) scheme built upon bilinear maps. This scheme turns out to be more efficient than all others proposed so far. We prove its security in a formal model under recently studied computational assumptions and in the random oracle model. As a result of independent interest, we propose a new provably secure identity-based signature (IBS) scheme that is also faster than all known pairing-based IBS methods.

Collaboration


Dive into the Paulo S. L. M. Barreto's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hae Yong Kim

University of São Paulo

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vincent Rijmen

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge