14.07.2013 Views

PBC Library Manual 0.5.11 - Stanford Crypto Group

PBC Library Manual 0.5.11 - Stanford Crypto Group

PBC Library Manual 0.5.11 - Stanford Crypto Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.3. Example cryptosystems<br />

Chapter 7. Bundled programs<br />

In the example subdirectory there are various programs that read curve parameters on standard input<br />

and perform computations that would be required in a typical implementation of a pairing-based<br />

cryptosystem. Sample schemes include:<br />

• Boneh-Lynn-Shacham short signatures<br />

• Hess identity-based signatures<br />

• Joux tripartite Diffie-Hellman<br />

• Paterson identity-based signatures<br />

• Yuan-Li identity-based authenticated key agreement<br />

• Zhang-Kim identity-based blind/ring signatures<br />

• Zhang-Safavi-Naini-Susilo signatures<br />

More work would be required to turn these programs into real applications.<br />

7.4. Benchmarks<br />

I use the programs in the benchmark subdirectory to measure running times of pairings, and also RSA<br />

decryptions.<br />

The benchmark program takes pairing parameters on standard input and reports the average running<br />

time of the pairing over 10 runs, while timersa estimates the time required to perform one 1024-bit<br />

RSA decryption.<br />

33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!