
Ebook: Pairing-Based Cryptography – Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008. Proceedings
Author: Liqun Chen Paul Morrissey Nigel P. Smart (auth.) Steven D. Galbraith Kenneth G. Paterson (eds.)
- Tags: Data Encryption, Algorithm Analysis and Problem Complexity, Discrete Mathematics in Computer Science, Data Structures Cryptology and Information Theory, Symbolic and Algebraic Manipulation
- Series: Lecture Notes in Computer Science 5209
- Year: 2008
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.
The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.
The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.
The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.
Content:
Front Matter....Pages -
Pairings in Trusted Computing....Pages 1-17
Pairing Lattices....Pages 18-38
The Uber-Assumption Family....Pages 39-56
Homomorphic Encryption and Signatures from Vector Decomposition....Pages 57-74
Hidden-Vector Encryption with Groups of Prime Order....Pages 75-88
The Hidden Root Problem....Pages 89-99
Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography....Pages 100-112
Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group....Pages 113-125
Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field....Pages 126-135
Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials....Pages 136-145
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties....Pages 146-163
Integer Variable ?–Based Ate Pairing....Pages 164-177
Pairing Computation on Twisted Edwards Form Elliptic Curves....Pages 178-191
Exponentiation in Pairing-Friendly Groups Using Homomorphisms....Pages 192-210
Generators for the ?-Torsion Subgroup of Jacobians of Genus Two Curves....Pages 211-224
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms....Pages 225-242
Pairings on Hyperelliptic Curves with a Real Model....Pages 243-264
One-Round ID-Based Blind Signature Scheme without ROS Assumption ....Pages 265-281
Tracing Malicious Proxies in Proxy Re-encryption....Pages 282-296
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities....Pages 297-315
Back Matter....Pages 316-331
....Pages 332-353