default search action
Pairing 2007: Tokyo, Japan
- Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto:
Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings. Lecture Notes in Computer Science 4575, Springer 2007, ISBN 978-3-540-73488-8
Invited Talk I
- Dan Boneh:
Bilinear Groups of Composite Order. 1
Applications
- Yong Ho Hwang, Pil Joong Lee:
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. 2-22 - Benoît Libert, Jean-Jacques Quisquater:
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. 23-38 - Cécile Delerablée, Pascal Paillier, David Pointcheval:
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. 39-59
Certificateless Public Key Encryption
- Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). 60-82 - Zhaohui Cheng, Liqun Chen, Li Ling, Richard Comley:
General and Efficient Certificateless Public Key Encryption Constructions. 83-107
Invited Talk II
- Steven D. Galbraith, Florian Hess, Frederik Vercauteren:
Hyperelliptic Pairings. 108-131
Hyperelliptic Curves
- Gabriel Cardona, Enric Nart:
Zeta Function and Cryptographic Exponent of Supersingular Curves of Genus 2. 132-151 - David Freeman:
Constructing Pairing-Friendly Genus 2 Curves with Ordinary Jacobians. 152-176
Invited Talk III
- Augusto Jun Devegili, Michael Scott, Ricardo Dahab:
Implementing Cryptographic Pairings over Barreto-Naehrig Curves. 197-207
Implementation
- Tobias Vejda, Dan Page, Johann Großschädl:
Instruction Set Extensions for Pairing-Based Cryptography. 208-224 - Claire Whelan, Michael Scott:
The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks. 225-246
Protocol I
- Toshihiko Matsuo:
Proxy Re-encryption Systems for Identity-Based Encryption. 247-267 - Emeline Hufschmitt, Jacques Traoré:
Fair Blind Signatures Revisited. 268-292
Invited Talk IV
- Alfred Menezes:
Supersingular Elliptic Curves in Cryptography. 293
Analysis
- Laura Hitt:
On the Minimal Embedding Field. 294-301 - Shunji Kozaki, Taketeru Kutsuma, Kazuto Matsuo:
Remarks on Cheon's Algorithms for Pairing-Related Problems. 302-316
Invited Talk V
- Takakazu Satoh:
On Pairing Inversion Problems. 317-328
Algorithms
- Katherine E. Stange:
The Tate Pairing Via Elliptic Nets. 329-348 - Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee:
Eta Pairing Computation on General Divisors over Hyperelliptic Curves y2 = x7-x+/-1. 349-366
Protocol II
- Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu:
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. 367-391 - Fuchun Guo, Yi Mu, Zhide Chen:
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. 392-406
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.