Pairing-based cryptography uses special maps defined on elliptic curve groups. A pairing is a function
Bilinear Pairings
Pairing-based cryptography uses special maps defined on elliptic curve groups. A pairing is a function
where , , and are finite groups, usually of the same large prime order.
The key property is bilinearity. For all integers and group elements , ,
This identity makes pairings useful in cryptography. It allows multiplicative relations among hidden exponents to be checked publicly.
Pairings on Elliptic Curves
In elliptic curve cryptography, the main pairings are the Weil pairing and the Tate pairing.
They are defined on torsion subgroups of elliptic curves. If is an elliptic curve and is a prime, then the -torsion subgroup is
A pairing takes points from suitable torsion subgroups and returns an element of a finite-field multiplicative group.
In practice, efficient pairings are computed on carefully chosen pairing-friendly curves.
Nondegeneracy
A useful cryptographic pairing must be nondegenerate. This means that it does not collapse all information to the identity.
For example, if
then there should exist some such that
Without nondegeneracy, the pairing would lose the exponent information needed for cryptographic protocols.
The Embedding Degree
Let be an elliptic curve over , and suppose is a large prime dividing
The embedding degree is the smallest positive integer such that
The pairing value lies in
For efficiency, should be small enough that pairing computation is practical. For security, it should be large enough that discrete logarithms in remain hard.
This balance is one of the main design constraints in pairing-based cryptography.
Miller’s Algorithm
Pairings are computed efficiently using Miller’s algorithm.
The algorithm evaluates rational functions along a scalar-multiplication-like loop. Its structure resembles double-and-add scalar multiplication, but it accumulates function values in an extension field.
Miller’s algorithm made pairing-based cryptography practical. Without it, pairings would be too expensive for real protocols.
Final Exponentiation
Many pairing computations produce an intermediate value that must be raised to a fixed exponent to obtain the final pairing value.
For example, the reduced Tate pairing involves a final exponentiation of the form
This step moves the result into the subgroup of order .
Efficient implementation of the final exponentiation is a major part of high-performance pairing libraries.
Identity-Based Encryption
One of the most famous uses of pairings is identity-based encryption.
In ordinary public-key cryptography, users need public keys and certificates. In identity-based encryption, a user’s public key may be derived from an identity string, such as an email address.
A trusted authority holds a master secret key and issues private keys corresponding to identities.
Pairings make this construction possible because they allow the system to bind identity-derived curve points to secret scalar information.
The Boneh-Franklin scheme is the classical example.
Short Signatures
Pairings also enable short digital signatures.
In the Boneh-Lynn-Shacham signature scheme, often called BLS, a private key is an integer
and the public key is
To sign a message, one hashes the message to a curve point
and computes
Verification checks a pairing equation:
The equality holds because
BLS signatures are compact and support efficient aggregation.
Signature Aggregation
Pairings allow many signatures to be combined into one.
If several users sign messages, their BLS signatures can often be aggregated into a single group element. Verification then uses pairing equations to check the aggregate.
This is useful in systems where many signatures must be verified or stored.
Applications include:
- blockchain consensus,
- distributed systems,
- threshold signatures,
- certificate transparency.
Aggregation is one reason pairing-based signatures remain important in modern cryptographic engineering.
Attribute-Based Encryption
Pairings also support attribute-based encryption.
In these systems, access control is expressed through attributes and policies. A ciphertext may be decryptable only by users whose keys satisfy a condition, such as:
Pairings provide algebraic mechanisms for enforcing such policies through exponent relations.
These systems are powerful but often more complex and expensive than ordinary public-key encryption.
Zero-Knowledge and SNARKs
Pairings are widely used in succinct proof systems.
Many zk-SNARK constructions use pairing-friendly curves to verify algebraic relations compactly.
A pairing check can compress a large algebraic verification into a small number of group operations.
This makes pairings important in:
- verifiable computation,
- privacy-preserving protocols,
- blockchain scaling,
- proof-carrying data.
The curves used in these systems, such as BN and BLS families, are selected for efficient pairings and suitable security levels.
Security Assumptions
Pairing-based cryptography relies on specialized hardness assumptions.
Important examples include:
- computational Diffie-Hellman,
- bilinear Diffie-Hellman,
- decisional bilinear Diffie-Hellman,
- co-Diffie-Hellman variants.
The presence of a pairing changes the security landscape. Some problems that are hard in ordinary elliptic curve groups become easier when a pairing is available.
Thus protocols must be designed around assumptions appropriate to bilinear groups.
Pairing-Friendly Curves
Not every elliptic curve is suitable for pairings.
A pairing-friendly curve must have:
- a large prime-order subgroup,
- a suitable embedding degree,
- efficient arithmetic in extension fields,
- resistance to known attacks.
Common families include:
- Barreto-Naehrig curves,
- Barreto-Lynn-Scott curves,
- Kachisa-Schaefer-Scott curves.
Curve choice affects both performance and security.
Implementation Concerns
Pairing implementations are complex.
They require:
- finite-field arithmetic,
- extension-field towers,
- subgroup checks,
- hash-to-curve algorithms,
- constant-time operations,
- careful parameter validation.
Subgroup mistakes are especially dangerous. If a protocol accepts points outside the correct subgroup, attackers may extract secret information or forge proofs.
Modern pairing systems therefore require rigorous validation and carefully specified encodings.
Quantum Vulnerability
Pairing-based cryptography is not post-quantum secure.
A sufficiently powerful quantum computer running Shor’s algorithm could solve the underlying discrete logarithm problems in elliptic curve groups and finite-field groups.
Thus pairing-based systems share the same broad quantum vulnerability as RSA and ordinary elliptic curve cryptography.
Conceptual Importance
Pairing-based cryptography shows that elliptic curves can do more than provide discrete-log groups.
A bilinear pairing creates a controlled bridge between additive elliptic curve groups and multiplicative finite-field groups. This bridge makes new cryptographic constructions possible.
Pairings enable identity-based encryption, short signatures, aggregation, advanced access control, and succinct proof systems. They are among the most important examples of arithmetic geometry becoming cryptographic infrastructure.