Pairing-Based Cryptography - Pairing 2010

4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings

Editors:

ISBN: 978-3-642-17454-4 (Print) 978-3-642-17455-1 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Efficient Software Implementation

    1. No Access

      Book Chapter

      Pages 1-20

      An Analysis of Affine Coordinates for Pairing Computation

    2. No Access

      Book Chapter

      Pages 21-39

      High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves

  3. Invited Talk 1

    1. No Access

      Book Chapter

      Pages 40-40

      Some Security Topics with Possible Applications for Pairing-Based Cryptography

  4. Digital Signatures

    1. No Access

      Book Chapter

      Pages 41-61

      A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange

    2. No Access

      Book Chapter

      Pages 62-77

      Anonymizable Signature and Its Construction from Pairings

    3. No Access

      Book Chapter

      Pages 78-95

      Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches

  5. Cryptographic Protocols

    1. No Access

      Book Chapter

      Pages 96-115

      Oblivious Transfer with Access Control : Realizing Disjunction without Duplication

    2. No Access

      Book Chapter

      Pages 116-135

      Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares

    3. No Access

      Book Chapter

      Pages 136-146

      Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability

  6. Key Agreement

    1. No Access

      Book Chapter

      Pages 147-166

      Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange

    2. No Access

      Book Chapter

      Pages 167-186

      Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement

    3. No Access

      Book Chapter

      Pages 187-205

      Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys

  7. Invited Talk 2

    1. No Access

      Book Chapter

      Pages 206-206

      Pairing-Based Non-interactive Zero-Knowledge Proofs

  8. Applications: Code Generation, Time-Released Encryption, Cloud Computing

    1. No Access

      Book Chapter

      Pages 207-224

      Designing a Code Generator for Pairing Based Cryptographic Functions

    2. No Access

      Book Chapter

      Pages 225-245

      Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability

    3. No Access

      Book Chapter

      Pages 246-264

      Optimal Authenticated Data Structures with Multilinear Forms

  9. Point Encoding and Pairing-Friendly Curves

    1. No Access

      Book Chapter

      Pages 265-277

      Deterministic Encoding and Hashing to Odd Hyperelliptic Curves

    2. No Access

      Book Chapter

      Pages 278-297

      Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time

    3. No Access

      Book Chapter

      Pages 298-311

      A New Method for Constructing Pairing-Friendly Abelian Surfaces

    4. No Access

      Book Chapter

      Pages 312-326

      Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves

previous Page of 2