Pairing-based cryptography-- Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised selected papers /
This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrical track were carefully...
Saved in:
Corporate Authors: | ; |
---|---|
Group Author: | ; |
Published: |
Springer,
|
Publisher Address: | Berlin ; New York : |
Publication Dates: | 2013. |
Literature type: | Electronic eBook |
Language: | English |
Series: |
Lecture notes in computer science,
7708 LNCS sublibrary. SL 4, Security and cryptology |
Subjects: | |
Online Access: |
http://dx.doi.org/10.1007/978-3-642-36334-4 |
Summary: |
This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrical track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software, industry track, properties of pairings, and signature schemes and applictions. |
Carrier Form: | 1 online resource (332 pages). |
Bibliography: | Includes bibliographical references and author index. |
ISBN: |
9783642363344 (electronic bk.) 3642363342 (electronic bk.) 3642363334 (print) 9783642363337 (print) |
Index Number: | QA76 |
CLC: | TP309-532 |
Contents: |
Algorithms for Pairing Computation -- On Efficient Pairings on Elliptic Curves over Extension Fields / Factor-4 and 6 (De)Compression for Values of Pairings Using Trace Maps / An Improved Twisted Ate Pairing over KSS Curves with k=18 / Security Models for Encryption -- Controlled Joining on Encrypted Relational Database / Stronger Security Model for Public-Key Encryption with Equality Test / Functional Encryption -- Forward-Secure Hierarchical Predicate Encryption / Fully Secure Hidden Vector Encryption / Shorter IBE and Signatures via Asymmetric Pairings / Implementations in Hardware and Software -- Core Based Architecture to Speed Up Optimal Ate Pairing on FPGA Platform / Faster Pairing Coprocessor Architecture / Implementing Pairings at the 192-Bit Security Level / Industry Track -- Improved Broadcast Encryption Scheme with Constant-Size Ciphertext / Affine Pairings on ARM / On the Implementation of a Pairing-Based Cryptographic Protocol in a Constrained Device / Properties of Pairings -- The Tate-Lichtenbaum Pairing on a Hyperelliptic Curve via Hyperelliptic Nets / Genus 2 Hyperelliptic Curve Fa |