Efficient Software Implementation |
An Analysis of Affine Coordinates for Pairing Computation / Kristin Lauter ; Peter L. Montgomery ; Michael Naehrig |
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves / Jean-Luc Beuchat ; Jorge E. González-DÃaz ; Shigeo Mitsunari ; Eiji Okamoto ; Francisco RodrÃguez-HenrÃquez ; Tadanori Teruya |
Invited Talk 1 |
Some Security Topics with Possible Applications for Pairing-Based Cryptography (Abstract) / Gene Tsudik |
Digital Signatures |
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange / Qiong Huang ; Duncan S. Wong ; Willy Susilo |
Anonymizable Signature and Its Construction from Pairings / Fumitaka Hoshino ; Tetsutaro Kobayashi ; Koutarou Suzuki |
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches / Brian J. Matt |
Cryptographic Protocols |
Oblivious Transfer with Access Control: Realizing Disjunction without Duplication / Ye Zhang ; Man Ho Au ; Nikos Mamoulis ; David W. Cheung ; Siu-Ming Yiu |
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares / Koen Simoens ; Roel Peeters ; Bart Preneel |
Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability / Lingbo Wei ; Jianwei Liu |
Key Agreement |
Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange / Kazuki Yoneyama |
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement / Dario Fiore ; Rosario Gennaro ; Nigel P. Smart |
Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys / Atsushi Fujioka ; Berkant Ustaoglu |
Invited Talk 2 |
Pairing-Based Non-interactive Zero-Knowledge Proofs (Abstract) / Jens Groth |
Applications: Code Generation, Time-Released Encryption, Cloud Computing |
Designing a Code Generator for Pairing Based Cryptographic Functions / Luis J. Dominguez Perez ; Michael Scott |
Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability / Takahiro Matsuda ; Yasumasa Nakai ; Kanta Matsuura |
Optimal Authenticated Data Structures with Multilinear Forms / Charalampos Papamanthou ; Roberto Tamassia ; Nikos Triandopoulos |
Point Encoding and Pairing-Friendly Curves |
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves / Pierre-Alain Fouque ; Mehdi Tibouchi |
Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time / Jean-Gabriel Kammerer ; Reynald Lercier ; Guénaël Renault |
A New Method for Constructing Pairing-Friendly Abelian Surfaces / Robert Drylo |
Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves / Ezekiel J. Kachisa |
ID-Based Encryption Schemes |
New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks / Lihua Wang ; Licheng Wang ; Masahiro Mambo |
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts / Angelo De Caro ; Vincenzo Iovino ; Giuseppe Persiano |
Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman / David Galindo |
Invited Talk 3 |
A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties / Joseph H. Silverman |
Efficient Hardware, FPGAs, and Algorithms |
Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves / Nicolas Estibals |
A Variant of Miller's Formula and Algorithm / John Boxall ; Nadia El Mrabet ; Fabien Laguillaumie ; Duc-Phong Le |
Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree / Sorina Ionica ; Antoine Joux |
High Speed Flexible Pairing Cryptoprocessor on FPGA Platform / Santosh Ghosh ; Debdeep Mukhopadhyay ; Dipanwita Roychowdhury |
Author Index |
Efficient Software Implementation |
An Analysis of Affine Coordinates for Pairing Computation / Kristin Lauter ; Peter L. Montgomery ; Michael Naehrig |
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves / Jean-Luc Beuchat ; Jorge E. González-DÃaz ; Shigeo Mitsunari ; Eiji Okamoto ; Francisco RodrÃguez-HenrÃquez ; Tadanori Teruya |
Invited Talk 1 |
Some Security Topics with Possible Applications for Pairing-Based Cryptography (Abstract) / Gene Tsudik |
Digital Signatures |