default search action
Pairing 2010: Yamanaka Hot Spring, Japan
- Marc Joye, Atsuko Miyaji, Akira Otsuka:
Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings. Lecture Notes in Computer Science 6487, Springer 2010, ISBN 978-3-642-17454-4
Efficient Software Implementation
- Kristin E. Lauter, Peter L. Montgomery, Michael Naehrig:
An Analysis of Affine Coordinates for Pairing Computation. 1-20 - Jean-Luc Beuchat, Jorge Enrique González-Díaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, Tadanori Teruya:
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves. 21-39
Invited Talk 1
- Gene Tsudik:
Some Security Topics with Possible Applications for Pairing-Based Cryptography. 40
Digital Signatures
- Qiong Huang, Duncan S. Wong, Willy Susilo:
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract). 41-61 - Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki:
Anonymizable Signature and Its Construction from Pairings. 62-77 - Brian J. Matt:
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches. 78-95
Cryptographic Protocols
- Ye Zhang, Man Ho Au, Duncan S. Wong, Qiong Huang, Nikos Mamoulis, David W. Cheung, Siu-Ming Yiu:
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication. 96-115 - Koen Simoens, Roel Peeters, Bart Preneel:
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares. 116-135 - Lingbo Wei, Jianwei Liu:
Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability. 136-146
Key Agreement
- Kazuki Yoneyama:
Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange. 147-166 - Dario Fiore, Rosario Gennaro, Nigel P. Smart:
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement. 167-186 - Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu:
Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys. 187-205
Invited Talk 2
- Jens Groth:
Pairing-Based Non-interactive Zero-Knowledge Proofs. 206
Applications: Code Generation, Time-Released Encryption, Cloud Computing
- Luis J. Dominguez Perez, Michael Scott:
Designing a Code Generator for Pairing Based Cryptographic Functions. 207-224 - Takahiro Matsuda, Yasumasa Nakai, Kanta Matsuura:
Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability. 225-245 - Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Optimal Authenticated Data Structures with Multilinear Forms. 246-264
Point Encoding and Pairing-Friendly Curves
- Pierre-Alain Fouque, Mehdi Tibouchi:
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves. 265-277 - Jean-Gabriel Kammerer, Reynald Lercier, Guénaël Renault:
Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time. 278-297 - Robert Drylo:
A New Method for Constructing Pairing-Friendly Abelian Surfaces. 298-311 - Ezekiel J. Kachisa:
Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves. 312-326
ID-Based Encryption Schemes
- Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks. 327-346 - Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts. 347-366 - David Galindo:
Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman. 367-376
Invited Talk 3
- Joseph H. Silverman:
A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties. 377-396
Efficient Hardware, FPGAs, and Algorithms
- Nicolas Estibals:
Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves. 397-416 - John Boxall, Nadia El Mrabet, Fabien Laguillaumie, Duc-Phong Le:
A Variant of Miller's Formula and Algorithm. 417-434 - Sorina Ionica, Antoine Joux:
Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree. 435-449 - Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
High Speed Flexible Pairing Cryptoprocessor on FPGA Platform. 450-466
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.