This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Artikelnr. des Verlages: 12454020, 978-3-540-85503-3
2008
Seitenzahl: 392
Erscheinungstermin: 25. August 2008
Englisch
Abmessung: 235mm x 155mm x 22mm
Gewicht: 599g
ISBN-13: 9783540855033
ISBN-10: 3540855033
Artikelnr.: 24766001
Inhaltsangabe
Invited Talks.- Pairings in Trusted Computing.- Pairing Lattices.- The Uber-Assumption Family.- Cryptography I.- Homomorphic Encryption and Signatures from Vector Decomposition.- Hidden-Vector Encryption with Groups of Prime Order.- Mathematics.- The Hidden Root Problem.- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography.- Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group.- Constructing Pairing Friendly Curves.- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field.- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials.- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties.- Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2?=?x 5?+?ax.- Implementation of Pairings.- Integer Variable ?-Based Ate Pairing.- Pairing Computation on Twisted Edwards Form Elliptic Curves.- Exponentiation in Pairing-Friendly Groups Using Homomorphisms.- Generators for the ?-Torsion Subgroup of Jacobians of Genus Two Curves.- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms.- Pairings on Hyperelliptic Curves with a Real Model.- Hardware Implementation.- Faster Implementation of ? T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition.- A Comparison between Hardware Accelerators for the Modified Tate Pairing over and .- Cryptography II.- One-Round ID-Based Blind Signature Scheme without ROS Assumption.- Tracing Malicious Proxies in Proxy Re-encryption.- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.
Invited Talks.- Pairings in Trusted Computing.- Pairing Lattices.- The Uber-Assumption Family.- Cryptography I.- Homomorphic Encryption and Signatures from Vector Decomposition.- Hidden-Vector Encryption with Groups of Prime Order.- Mathematics.- The Hidden Root Problem.- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography.- Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group.- Constructing Pairing Friendly Curves.- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field.- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials.- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties.- Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2?=?x 5?+?ax.- Implementation of Pairings.- Integer Variable ?-Based Ate Pairing.- Pairing Computation on Twisted Edwards Form Elliptic Curves.- Exponentiation in Pairing-Friendly Groups Using Homomorphisms.- Generators for the ?-Torsion Subgroup of Jacobians of Genus Two Curves.- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms.- Pairings on Hyperelliptic Curves with a Real Model.- Hardware Implementation.- Faster Implementation of ? T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition.- A Comparison between Hardware Accelerators for the Modified Tate Pairing over and .- Cryptography II.- One-Round ID-Based Blind Signature Scheme without ROS Assumption.- Tracing Malicious Proxies in Proxy Re-encryption.- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497