Dan Boneh (auth.), Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto (eds.)3540734880, 9783540734888
As anyone in the sector will know, this is a massively important field of endeavor, as computer crime becomes ever more sophisticated and companies providing goods on the internet are required to be ever more inventive in counteracting it.
All of which makes this book all the more relevant, being as it is the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in 2007.
The 18 revised full papers presented together with 2 abstracts and 3 full papers of invited talks were carefully reviewed and selected from 86 submissions.
The papers are organized in topical sections on applications, certificateless public key encryption, hyperelliptic curves, implementation, cryptographic protocols, cryptanalysis, and cryptographic algorithms.
This publication, of more than 400 pages, also includes online files along with regular updates.
Table of contents :
Front Matter….Pages –
Bilinear Groups of Composite Order….Pages 1-1
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System….Pages 2-22
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps….Pages 23-38
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys….Pages 39-59
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles)….Pages 60-82
General and Efficient Certificateless Public Key Encryption Constructions….Pages 83-107
Hyperelliptic Pairings….Pages 108-131
Zeta Function and Cryptographic Exponent of Supersingular Curves of Genus 2….Pages 132-151
Constructing Pairing-Friendly Genus 2 Curves with Ordinary Jacobians….Pages 152-176
Front Matter….Pages 177-196
Implementing Cryptographic Pairings over Barreto-Naehrig Curves….Pages 197-207
Instruction Set Extensions for Pairing-Based Cryptography….Pages 208-224
The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks….Pages 225-246
Proxy Re-encryption Systems for Identity-Based Encryption….Pages 247-267
Fair Blind Signatures Revisited….Pages 268-292
Supersingular Elliptic Curves in Cryptography….Pages 293-293
On the Minimal Embedding Field ….Pages 294-301
Remarks on Cheon’s Algorithms for Pairing-Related Problems….Pages 302-316
On Pairing Inversion Problems….Pages 317-328
The Tate Pairing Via Elliptic Nets….Pages 329-348
Eta Pairing Computation on General Divisors over Hyperelliptic Curves y 2 = x 7 − x ±1….Pages 349-366
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length….Pages 367-391
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key….Pages 392-406
Back Matter….Pages –
Reviews
There are no reviews yet.