“…Pairings on elliptic curves enable innovative protocols, e.g., IDbased encryption [9], group signature authentication [7], searchable encryption [8], attribute-based encryption [15], and homomorphic encryption [32]. Since these pairing-based protocols can be indirectly improved through the improvement of the pairings, researchers have been working on methods to construct several families of pairing-friendly elliptic curves [3,4,13,22], optimizations of the pairing algorithm [10,14,20,21,28,34,38], security analyses [1,2,12,17,18], and so on. As one of recent works of the pairings, in [1], Barbulescu and Duquesne analyzed the key size of the pairings that have resistance against an attack for a discrete logarithm problem given by Kim et al in [24].…”