Pairing-Based Cryptography Sample Clauses

Pairing-Based Cryptography. Bilinear pairings of algebraic curves were originally used as cryptographic tools for re- ducing the discrete logarithm problem in weak elliptic curves [41, 24]. In 2000, however, Joux [32] showed that pairings also could have a positive use in cryptography by con- structing a tripartite Xxxxxx-Xxxxxxx key agreement protocol based on the Weil pairing. The message flows of the protocol are identical to the elliptic curve-based Xxxxxx-Xxxxxxx protocol, but use the Weil pairing in computing the session key. As there is no way of efficiently computing discrete logarithms on elliptic curves, it is possible to maintain a high level of security while using short keys. Boneh and Franklin [9] extended the idea by Joux and constructed an identity-based encryption scheme based on the properties of bilinear pairings on elliptic curves. The scheme was the first fully functional, efficient and provably secure identity-based encryp- tion scheme, and was shortly followed by the BLS short signature scheme [10]. Since the introduction of these two important applications of pairings, many new pairing-based cryptographic protocols have been designed and analyzed (see [23] for a survey). A lot of the work concerning pairing-based cryptography is on the realization and effi- cient implementation of pairings. Such implementations may, for instance, be done using the Weil pairing or the Xxxx pairing. Although both involve fairly complex mathematics, they can be dealt with abstractly. Most key agreement protocols use a modified pairing in order to avoid sending two points per participant. For more detailed information about pairings and their use in cryptographic protocols, see [33, 26].
AutoNDA by SimpleDocs

Related to Pairing-Based Cryptography

  • Unbundled Network Element Combinations 5.1. Unbundled Network Element Combinations shall include: 1) Enhanced Extended Links (EELs); 2) UNE Loops/Special Access Combinations; 3) Loop/Port Combinations; and 4)

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Unbundled Loops 2.1.1 BellSouth agrees to offer access to unbundled loops pursuant to the following terms and conditions and at the rates set forth in Attachment 11.

  • Unbundled Voice Loops (UVL) may be provisioned using any type of facility that will support voice grade services. This may include loaded copper, non-loaded copper, digital loop carrier systems, fiber/copper combination (hybrid loop) or a combination of any of these facilities. BellSouth, in the normal course of maintaining, repairing, and configuring its network, may also change the facilities that are used to provide any given voice grade circuit. This change may occur at any time. In these situations, BellSouth will only ensure that the newly provided facility will support voice grade services. BellSouth will not guarantee that Southern Telecom will be able to continue to provide any advanced services over the new facility. BellSouth will offer UVL in two different service levels - Service Level One (SL1) and Service Level Two (SL2).

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Signaling protocol The Parties will interconnect their networks using SS7 signaling where Technically Feasible and available as defined in GR 905 Telcordia Standards including ISDN User Part (ISUP) for trunk signaling and TCAP for CCS-based features in the Interconnection of their networks. All Network Operations Forum (NOF) adopted standards shall be adhered to. Where available, CenturyLink signaling services to link its Signaling Transfer Points (STPs) for CLEC switches which connect to CenturyLink’s STPs via “A” links or for CLEC’s STPs to connect to CenturyLink’s STPs via “D” links which are dedicated to the transport of signaling for local Interconnection, may be ordered from the CenturyLink Tariff.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Unbundled Digital Loops 2.3.1 BellSouth will offer Unbundled Digital Loops (UDL). UDLs are service specific, will be designed, will be provisioned with test points (where appropriate), and will come standard with OC and a DLR. The various UDLs are intended to support a specific digital transmission scheme or service. 2.3.2 BellSouth shall make available the following UDLs, subject to restrictions set forth herein:

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!