PBC Library Manual 0.5.11 - Stanford Crypto Group
PBC Library Manual 0.5.11 - Stanford Crypto Group
PBC Library Manual 0.5.11 - Stanford Crypto Group
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
7.3. Example cryptosystems<br />
Chapter 7. Bundled programs<br />
In the example subdirectory there are various programs that read curve parameters on standard input<br />
and perform computations that would be required in a typical implementation of a pairing-based<br />
cryptosystem. Sample schemes include:<br />
• Boneh-Lynn-Shacham short signatures<br />
• Hess identity-based signatures<br />
• Joux tripartite Diffie-Hellman<br />
• Paterson identity-based signatures<br />
• Yuan-Li identity-based authenticated key agreement<br />
• Zhang-Kim identity-based blind/ring signatures<br />
• Zhang-Safavi-Naini-Susilo signatures<br />
More work would be required to turn these programs into real applications.<br />
7.4. Benchmarks<br />
I use the programs in the benchmark subdirectory to measure running times of pairings, and also RSA<br />
decryptions.<br />
The benchmark program takes pairing parameters on standard input and reports the average running<br />
time of the pairing over 10 runs, while timersa estimates the time required to perform one 1024-bit<br />
RSA decryption.<br />
33