A Weil pairing on the p-torsion of ordinary elliptic curves over <mml:math altimg="si1.gif" overflow="scroll" xmlns:xocs="http://www.elsevier.com/xml/xocs/dtd" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.elsevier.com/xml/ja/dtd" xmlns:ja="http://www.elsevier.com/xml/ja/dtd" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:tb="http://www.elsevier.com/xml/common/table/dtd" xmlns:sb="http://www.elsevier.com/xml/common/struct-bib/dtd" xmlns:ce="http://www.elsevier.com/xml/common/dtd" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:cals="http://www.elsevier.com/xml/common/cals/dtd"><mml:mi>K</mml:mi><mml:mo stretchy="false">[</mml:mo><mml:mi mathvariant="normal">??</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math>, Journal of Number Theory, vol.128, issue.6, pp.1874-1888, 2008. ,
DOI : 10.1016/j.jnt.2008.02.002
Elligator, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.425-438, 2013. ,
DOI : 10.1145/2508859.2516734
The Decision Diffie-Hellman problem, ANTS-III, LNCS 1423, pp.48-63, 2006. ,
DOI : 10.1007/BFb0054851
Why Textbook ElGamal and RSA Encryption Are Insecure, ASIACRYPT 2000, pp.30-43, 1976. ,
DOI : 10.1007/3-540-44448-3_3
Direct chosen ciphertext security from identitybased techniques, ACM-CCS 2005, pp.320-329, 2005. ,
Chosen-Ciphertext Security from Identity-Based Encryption, EUROCRYPT 2004, pp.207-222, 2004. ,
DOI : 10.1007/978-3-540-24676-3_13
The twin Diffie-Hellman problem and applications, EUROCRYPT 2008, pp.127-145, 2008. ,
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm, ASIACRYPT 2002, pp.299-310, 2002. ,
DOI : 10.1007/3-540-36178-2_19
Encoding-Free ElGamal Encryption Without Random Oracles, PKC 2006, pp.91-104, 2006. ,
DOI : 10.1145/359340.359342
A secure and optimally efficient multi-authority election scheme, EUROCRYPT '97, pp.103-118, 1997. ,
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, CRYPTO 1998, pp.13-25, 1998. ,
DOI : 10.1007/BFb0055717
On-line/off-line digital signatures, Journal of Cryptology, vol.26, issue.6, pp.35-67, 1996. ,
DOI : 10.1007/BF02254791
Hashing into Hessian curves, AFRICACRYPT 2011, pp.278-289, 2011. ,
Injective Encodings to Elliptic Curves, ACISP 2013, pp.203-218, 2013. ,
DOI : 10.1007/978-3-642-39059-3_14
URL : https://hal.archives-ouvertes.fr/hal-01094294
Elliptic Curve Paillier Schemes, Journal of Cryptology, vol.15, issue.2, pp.129-138, 2002. ,
DOI : 10.1007/s00145-001-0015-6
Secure Hashed Diffie-Hellman over Non-DDH??Groups, EUROCRYPT 2004, pp.361-381, 2004. ,
DOI : 10.1007/978-3-540-24676-3_22
A note on an encryption scheme of Kurosawa and Desmedt. Cryptology ePrint Archive, Report, 2004. ,
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : https://doi.org/10.1016/0022-0000(84)90070-9
A Pseudorandom Generator from any One-way Function, SIAM Journal on Computing, vol.28, issue.4, pp.1364-1396, 1999. ,
DOI : 10.1137/S0097539793244708
A pseudorandom generator from any one-way function, STOC '89, pp.12-24, 1989. ,
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
Chameleon signatures, NDSS 2000, 2000. ,
Use of Elliptic Curves in Cryptography, CRYPTO '85, pp.417-426, 1986. ,
DOI : 10.1007/3-540-39799-X_31
An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.1, pp.106-110, 1978. ,
DOI : 10.1109/TIT.1978.1055817
Monte Carlo methods for index computation mod p, Math. Comp, vol.32, pp.918-924, 1978. ,
Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report, vol.332, 2004. ,
The Theory of Elliptic Curves, GTM 106, 1986. ,
On the security of ElGamal based encryption, PKC '98, pp.117-134, 1998. ,
DOI : 10.1007/BFb0054019
A cryptosystem ElGamal on an elliptic curve over Fp, WE- WoRC 2005, LNI 74, pp.32-44, 2005. ,
Courbes elliptiques sur un anneau et applications cryptographiques, 2009. ,
URL : https://hal.archives-ouvertes.fr/tel-00401449
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions, ACNS 2007, pp.323-339, 2007. ,
DOI : 10.1007/978-3-540-72738-5_21