Online Library TheLib.net » Pairing-Based Cryptography – Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.

The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.




This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.

The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.




This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.

The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.


Content:
Front Matter....Pages -
Pairings in Trusted Computing....Pages 1-17
Pairing Lattices....Pages 18-38
The Uber-Assumption Family....Pages 39-56
Homomorphic Encryption and Signatures from Vector Decomposition....Pages 57-74
Hidden-Vector Encryption with Groups of Prime Order....Pages 75-88
The Hidden Root Problem....Pages 89-99
Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography....Pages 100-112
Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group....Pages 113-125
Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field....Pages 126-135
Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials....Pages 136-145
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties....Pages 146-163
Integer Variable ?–Based Ate Pairing....Pages 164-177
Pairing Computation on Twisted Edwards Form Elliptic Curves....Pages 178-191
Exponentiation in Pairing-Friendly Groups Using Homomorphisms....Pages 192-210
Generators for the ?-Torsion Subgroup of Jacobians of Genus Two Curves....Pages 211-224
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms....Pages 225-242
Pairings on Hyperelliptic Curves with a Real Model....Pages 243-264
One-Round ID-Based Blind Signature Scheme without ROS Assumption ....Pages 265-281
Tracing Malicious Proxies in Proxy Re-encryption....Pages 282-296
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities....Pages 297-315
Back Matter....Pages 316-331
....Pages 332-353
Download the book Pairing-Based Cryptography – Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen