Pairing-Based Cryptography – Pairing 2008

Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

  • Editors
  • Steven D. Galbraith
  • Kenneth G. Paterson
Conference proceedings Pairing 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5209)

Table of contents

  1. Front Matter
  2. Invited Talks

    1. Liqun Chen, Paul Morrissey, Nigel P. Smart
      Pages 1-17
    2. Florian Hess
      Pages 18-38
    3. Xavier Boyen
      Pages 39-56
  3. Cryptography I

    1. Tatsuaki Okamoto, Katsuyuki Takashima
      Pages 57-74
    2. Vincenzo Iovino, Giuseppe Persiano
      Pages 75-88
  4. Mathematics

    1. Frederik Vercauteren
      Pages 89-99
    2. Reinier Bröker, Denis Charles, Kristin Lauter
      Pages 100-112
    3. Kirsten Eisenträger, Dimitar Jetchev, Kristin Lauter
      Pages 113-125
  5. Constructing Pairing Friendly Curves

  6. Implementation of Pairings

    1. Yasuyuki Nogami, Masataka Akane, Yumi Sakemi, Hidehiro Kato, Yoshitaka Morikawa
      Pages 178-191
    2. M. Prem Laxman Das, Palash Sarkar
      Pages 192-210
    3. Steven D. Galbraith, Michael Scott
      Pages 211-224
    4. Steven D. Galbraith, Xibin Lin, David J. Mireles Morales
      Pages 265-281
  7. Hardware Implementation

    1. Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez
      Pages 297-315
  8. Cryptography II

    1. Wei Gao, Guilin Wang, Xueli Wang, Fei Li
      Pages 316-331
    2. Benoît Libert, Damien Vergnaud
      Pages 332-353
    3. Kenneth G. Paterson, Sriramkrishnan Srinivasan
      Pages 354-375
  9. Back Matter

About these proceedings


This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.

The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.


Tate paring algorithms bilinear group broadcast encryption cryptographic protocols cryptography elliptic curves hardware acceleration hidden root homomorphic encryption hyperelliptic curves identity-based encryption lattices pairing trusted computing

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-85503-3
  • Online ISBN 978-3-540-85538-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site