When Bob Met Alice And Carol: Shared key Over Three Parties with BN-curves

Elliptic curves are used fairly extensively in public key encryption (such as in Bitcoin and Tor). A BN-curve (Barreto-Naehrig curve) [paper] defines an elliptic curve which can be used for pairings that allow for a high security and efficiency level.

So how do we generate a shared key between three parties? This page implements the…

This publication brings together interesting articles related to cyber security.

Recommended from Medium

Onboarding in Cloudflare

QA Trends: Testing Everything!

Follow the Crumbs

Cloudflare … A Great Service and Company

{UPDATE} kicker Matchday Hack Free Resources Generator

Do I need an SSL Certificate for my website?

New Partnership CoinVotes — CoinBrain

Bringing Pockit to your doorstep

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

Elliptic Curves, Base Points and Scalars

Patents: Changing the World, Or Not?

Which Encryption Method Does An Encrypts On Either Side?

Building a More Trusted, Citizen Focused World …