Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring,

Pairing-Based Cryptography - Pairing 2010

4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings

Joye, Marc, Miyaji, Atsuko, Otsuka, Akira (Eds.)

2010, XIII, 467p. 37 illus..

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-3-642-17455-1

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-642-17454-4

free shipping for individuals worldwide

online orders shipping within 2-3 days.

add to marked items

  • Fast-track proceedings
The4thInternationalConferenceonPairing-BasedCryptography(Pairing2010) was held in Yamanaka Hot Spring, Japan, during December 13-15, 2010. It was jointly co-organized by the National Institute of Advanced Industrial Science and Technology (AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). The goal of Pairing 2010 was to bring together leading researchersand pr- titioners from academia and industry, all concerned with problems related to pairing-based cryptography. We hope that this conference enhanced com- nication among specialists from various research areas and promoted creative interdisciplinary collaboration. Theconferencereceived64submissionsfrom17countries,outofwhich25- pers from 13 countries were accepted for publication in these proceedings. At least three Program Committee (PC) members reviewed each submitted paper, while submissions co-authored by a PC member were submitted to the more stringent evaluation of ?ve PC members. In addition to the PC members, many externalreviewersjoinedthereviewprocessintheirparticularareasofexpertise. We were fortunate to have this energetic team of experts, and are deeply gra- ful to all of them for their hard work, which included a very active discussion phase. The paper submission, review and discussion processes were e?ectively and e?ciently made possible by the Web-based system iChair. Furthermore,theconferencefeaturedthreeinvitedspeakers:JensGrothfrom University College London, Joseph H. Silverman from Brown University, and Gene Tsudik from University of California at Irvine, whose lectures on cutti- edge research areas— “Pairing-Based Non-interactive Zero-Knowledge Proofs,” “A Survey of Local and Global Pairings on Elliptic Curves and Abelian Va- eties,” and “Some Security Topics with Possible Applications for Pairing-Based Cryptography,” respectively— contributed in a signi?cant part to the richness of the program.

Content Level » Research

Keywords » Hashing - Tate pairing - abelian surfaces - algorithms - calculus - cryptographic functions - cryptography - data structures - efficient encryption - hash functions - hyperelliptic curves - id-based encryption - key exchange - pairing-based signa - supersingular curves

Related subjects » Communication Networks - Security and Cryptology - Theoretical Computer Science

Table of contents 

Efficient Software Implementation.- An Analysis of Affine Coordinates for Pairing Computation.- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves.- Invited Talk 1.- Some Security Topics with Possible Applications for Pairing-Based Cryptography.- Digital Signatures.- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange.- Anonymizable Signature and Its Construction from Pairings.- Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches.- Cryptographic Protocols.- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication.- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares.- Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability.- Key Agreement.- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange.- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement.- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys.- Invited Talk 2.- Pairing-Based Non-interactive Zero-Knowledge Proofs.- Applications: Code Generation, Time-Released Encryption, Cloud Computing.- Designing a Code Generator for Pairing Based Cryptographic Functions.- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability.- Optimal Authenticated Data Structures with Multilinear Forms.- Point Encoding and Pairing-Friendly Curves.- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves.- Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time.- A New Method for Constructing Pairing-Friendly Abelian Surfaces.- Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves.- ID-Based Encryption Schemes.- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks.- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts.- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman.- Invited Talk 3.- A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties.- Efficient Hardware, FPGAs, and Algorithms.- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves.- A Variant of Miller’s Formula and Algorithm.- Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree.- High Speed Flexible Pairing Cryptoprocessor on FPGA Platform.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Encryption.