Robert Granger, Martijn Stam
Although identity-based cryptography offers a number of functional advantages over conventional public key methods, the computational costs are significantly greater. The dominant part of this cost is the Tate pairing, which, in characteristic three, is be ...
Institute of Electrical and Electronics Engineers2005