{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T04:11:57Z","timestamp":1776917517519,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642121883","type":"print"},{"value":"9783642121890","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12189-0_17","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T18:11:05Z","timestamp":1270059065000},"page":"188-198","source":"Crossref","is-referenced-by-count":19,"title":["Java Implementation for Pairing-Based Cryptosystems"],"prefix":"10.1007","author":[{"given":"Syh-Yuan","family":"Tan","sequence":"first","affiliation":[]},{"given":"Swee-Huay","family":"Heng","sequence":"additional","affiliation":[]},{"given":"Bok-Min","family":"Goi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P.S.L.M. Barreto","year":"2002","unstructured":"Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 354\u2013368. Springer, Heidelberg (2002)"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/978-3-540-24676-3_17","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 268\u2013286. Springer, Heidelberg (2004)"},{"key":"17_CR3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546570","volume-title":"Advances in elliptic curve cryptography","author":"I. Blake","year":"2005","unstructured":"Blake, I., Seroussi, G., Smart, N.P.: Advances in elliptic curve cryptography. Cambridge University Press, Cambridge (2005)"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 223\u2013238. Springer, Heidelberg (2004)"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/978-3-540-28628-8_27","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 443\u2013459. Springer, Heidelberg (2004)"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/11426639_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"D. Boneh","year":"2005","unstructured":"Boneh, D., Boyen, X., Goh, E.J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 440\u2013456. Springer, Heidelberg (2005)"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Sacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"17_CR9","unstructured":"Cryptix Project, \n                    \n                      http:\/\/www.cryptix.org\/"},{"key":"17_CR10","unstructured":"FlexiProvider, \n                    \n                      http:\/\/www.flexiprovider.de\/"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Selected Areas in Cryptography","author":"F. Hess","year":"2003","unstructured":"Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 310\u2013324. Springer, Heidelberg (2003)"},{"key":"17_CR12","unstructured":"Java\n                    TM\n                   cryptographic architecture (JCA) reference guide for Java\n                    TM\n                   Platform Standard Edition 6, \n                    \n                      http:\/\/java.sun.com\/javase\/6\/docs\/technotes\/guides\/security\/cryptocryptospec.html"},{"key":"17_CR13","unstructured":"jBorZoi 0.90, \n                    \n                      http:\/\/dragongate-technologies.com\/jBorZoi\/jBorZoi_0.90.zip"},{"key":"17_CR14","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-3-540-74377-4_42","volume-title":"Computational Intelligence and Security","author":"Y. Kawahara","year":"2007","unstructured":"Kawahara, Y., Takagi, T., Okamoto, E.: Efficient implementation of Tate pairing on a mobile phone using Java. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol.\u00a04456, pp. 396\u2013405. Springer, Heidelberg (2007)"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/978-3-540-24632-9_18","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"K. Kurosawa","year":"2004","unstructured":"Kurosawa, K., Heng, S.-H.: From digital signature to ID-based identification\/signature. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 248\u2013261. Springer, Heidelberg (2004)"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/11424826_64","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"K. Kurosawa","year":"2005","unstructured":"Kurosawa, K., Heng, S.-H.: Identity-based identification without random oracles. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03481, pp. 603\u2013613. Springer, Heidelberg (2005)"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/11745853_24","volume-title":"Public Key Cryptography - PKC 2006","author":"K. Kurosawa","year":"2006","unstructured":"Kurosawa, K., Heng, S.-H.: The power of identification schemes. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 364\u2013377. Springer, Heidelberg (2006)"},{"key":"17_CR18","unstructured":"Legion of the Bouncy Castle, \n                    \n                      http:\/\/www.bouncycastle.org\/"},{"key":"17_CR19","unstructured":"Lynn, B.: PBC library (2006), \n                    \n                      http:\/\/rooster.standford.edu\/-ben\/pbc\/download.html"},{"key":"17_CR20","unstructured":"Lynn, B.: Ph.D thesis: On the implementation of pairing-based cryptosystems (2008), \n                    \n                      http:\/\/crypto.stanford.edu\/pbc\/thesis.pdf"},{"key":"17_CR21","unstructured":"Miller, V.: Short programs for functions on curves. Unpublished manuscript (1986), \n                    \n                      http:\/\/crypto.stanford.edu\/miller\/miller.pdf"},{"key":"17_CR22","unstructured":"Nightingle, J.S.: Comparative analysis of Java cryptographic libraries for public key cryptography. George Mason University: Department of Electrical and Computer Engineering, \n                    \n                      http:\/\/ece.gmu.edu\/courses\/ECE746\/project\/specs_2006\/java_multiprecision.pdf"},{"key":"17_CR23","unstructured":"PassMark\u00ae Software, \n                    \n                      http:\/\/www.cpubenchmark.net\/"},{"issue":"18","key":"17_CR24","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1049\/el:20020682","volume":"38","author":"K.G. Paterson","year":"2002","unstructured":"Paterson, K.G.: ID-based signatures from pairings on elliptic curves. Electronic Letters\u00a038(18), 1025\u20131026 (2002); IET Digital Library","journal-title":"Electronic Letters"},{"key":"17_CR25","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: SCIS 2000 (2000)"},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A. Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 457\u2013473. Springer, Heidelberg (2005)"},{"key":"17_CR27","unstructured":"Scott, M.: MIRACL library (2005), \n                    \n                      http:\/\/ftp.computing.dcu.ie\/pub\/crypto\/miracl.zip"},{"key":"17_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-540-30574-3_20","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"M. Scott","year":"2005","unstructured":"Scott, M.: Computing the Tate pairing. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 293\u2013304. Springer, Heidelberg (2005), \n                    \n                      http:\/\/ftp.computing.dcu.ie\/pub\/crypto\/miracl.zip"},{"key":"17_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"issue":"13","key":"17_CR30","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N.P. Smart","year":"2002","unstructured":"Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electronic Letters\u00a038(13), 630\u2013632 (2002); IET Digital Library","journal-title":"Electronic Letters"},{"key":"17_CR31","unstructured":"Solinas, J.: ID-based digital signature algorithms (2003), \n                    \n                      http:\/\/www.cacr.math.uwaterloo.ca\/conferences\/2003\/ecc2003\/solinas.pdf"},{"key":"17_CR32","unstructured":"St\u00f6gbuer, M.: Diploma thesis: Efficient algorithms for pairing-based cryptosystems (2004), \n                    \n                      http:\/\/www.cdc.informatik.tu-darmstadt.de\/reports\/reports\/KP\/Marcus_Stoegbauer.diplom.pdf"},{"issue":"1","key":"17_CR33","first-page":"21","volume":"1","author":"S.-Y. Tan","year":"2009","unstructured":"Tan, S.-Y., Heng, S.-H., Goi, B.-M., Chin, J.-J., Moon, S.: Java implementation for identity-based identification. International Journal of Cryptology Research\u00a01(1), 21\u201332 (2009)","journal-title":"International Journal of Cryptology Research"},{"key":"17_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B. Waters","year":"2005","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 114\u2013127. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12189-0_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:04:32Z","timestamp":1619769872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12189-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121883","9783642121890"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12189-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}