Pairing-Based Cryptography - Pairing 2009 Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings / edited by Hovav Shacham, Brent Waters.

This book constitutes the refereed proceedings of the Third International Conference on Pairing-Based Cryptography, Pairing 2009, held in Palo Alto, CA, USA, in August 2009. The 16 full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sec...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Shacham, Hovav (Editor), Waters, Brent (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edition:1st ed. 2009.
Series:Security and Cryptology ; 5671
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Signature Security
  • Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem
  • Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
  • Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model
  • Curves
  • On the Security of Pairing-Friendly Abelian Varieties over Non-prime Fields
  • Generating Pairing-Friendly Curves with the CM Equation of Degree 1
  • Pairing Computation
  • On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves
  • Faster Pairings on Special Weierstrass Curves
  • Fast Hashing to G 2 on Pairing-Friendly Curves
  • NIZKs and Applications
  • Compact E-Cash and Simulatable VRFs Revisited
  • Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
  • Group Signatures
  • Identity Based Group Signatures from Hierarchical Identity-Based Encryption
  • Forward-Secure Group Signatures from Pairings
  • Efficient Traceable Signatures in the Standard Model
  • Protocols
  • Strongly Secure Certificateless Key Agreement
  • Universally Composable Adaptive Priced Oblivious Transfer
  • Conjunctive Broadcast and Attribute-Based Encryption.