Pairing-based cryptography-- Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised selected papers /

This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrical track were carefully...

Full description

Saved in:
Bibliographic Details
Corporate Authors: International Conference on Pairing-Based Cryptography Cologne, Germany); SpringerLink (Online service)
Group Author: Abdalla, Michel.; Lange, Tanja, 1975-
Published: Springer,
Publisher Address: Berlin ; New York :
Publication Dates: 2013.
Literature type: Electronic eBook
Language: English
Series: Lecture notes in computer science, 7708
LNCS sublibrary. SL 4, Security and cryptology
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-36334-4
Summary: This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrical track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software, industry track, properties of pairings, and signature schemes and applictions.
Carrier Form: 1 online resource (332 pages).
Bibliography: Includes bibliographical references and author index.
ISBN: 9783642363344 (electronic bk.)
3642363342 (electronic bk.)
3642363334 (print)
9783642363337 (print)
Index Number: QA76
CLC: TP309-532
Contents: Algorithms for Pairing Computation --
On Efficient Pairings on Elliptic Curves over Extension Fields /
Factor-4 and 6 (De)Compression for Values of Pairings Using Trace Maps /
An Improved Twisted Ate Pairing over KSS Curves with k=18 /
Security Models for Encryption --
Controlled Joining on Encrypted Relational Database /
Stronger Security Model for Public-Key Encryption with Equality Test /
Functional Encryption --
Forward-Secure Hierarchical Predicate Encryption /
Fully Secure Hidden Vector Encryption /
Shorter IBE and Signatures via Asymmetric Pairings /
Implementations in Hardware and Software --
Core Based Architecture to Speed Up Optimal Ate Pairing on FPGA Platform /
Faster Pairing Coprocessor Architecture /
Implementing Pairings at the 192-Bit Security Level /
Industry Track --
Improved Broadcast Encryption Scheme with Constant-Size Ciphertext /
Affine Pairings on ARM /
On the Implementation of a Pairing-Based Cryptographic Protocol in a Constrained Device /
Properties of Pairings --
The Tate-Lichtenbaum Pairing on a Hyperelliptic Curve via Hyperelliptic Nets /
Genus 2 Hyperelliptic Curve Fa