This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography …