Pairing-Based Cryptography – Pairing 2007: First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography.

As anyone in the sector will know, this is a massively important field of endeavor, as computer crime becomes ever more sophisticated and companies providing goods on the internet are required to be ever more inventive in counteracting it.

All of which makes this book all the more relevant, being as it is the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in 2007.

The 18 revised full papers presented together with 2 abstracts and 3 full papers of invited talks were carefully reviewed and selected from 86 submissions.

The papers are organized in topical sections on applications, certificateless public key encryption, hyperelliptic curves, implementation, cryptographic protocols, cryptanalysis, and cryptographic algorithms.

This publication, of more than 400 pages, also includes online files along with regular updates.

Author(s): Dan Boneh (auth.), Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto (eds.)
Series: Lecture Notes in Computer Science 4575 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 410
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Symbolic and Algebraic Manipulation

Front Matter....Pages -
Bilinear Groups of Composite Order....Pages 1-1
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System....Pages 2-22
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps....Pages 23-38
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys....Pages 39-59
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles)....Pages 60-82
General and Efficient Certificateless Public Key Encryption Constructions....Pages 83-107
Hyperelliptic Pairings....Pages 108-131
Zeta Function and Cryptographic Exponent of Supersingular Curves of Genus 2....Pages 132-151
Constructing Pairing-Friendly Genus 2 Curves with Ordinary Jacobians....Pages 152-176
Front Matter....Pages 177-196
Implementing Cryptographic Pairings over Barreto-Naehrig Curves....Pages 197-207
Instruction Set Extensions for Pairing-Based Cryptography....Pages 208-224
The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks....Pages 225-246
Proxy Re-encryption Systems for Identity-Based Encryption....Pages 247-267
Fair Blind Signatures Revisited....Pages 268-292
Supersingular Elliptic Curves in Cryptography....Pages 293-293
On the Minimal Embedding Field ....Pages 294-301
Remarks on Cheon’s Algorithms for Pairing-Related Problems....Pages 302-316
On Pairing Inversion Problems....Pages 317-328
The Tate Pairing Via Elliptic Nets....Pages 329-348
Eta Pairing Computation on General Divisors over Hyperelliptic Curves y 2  =  x 7  −  x ±1....Pages 349-366
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length....Pages 367-391
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key....Pages 392-406
Back Matter....Pages -