


default search action
Pairing 2007: Tokyo, Japan
- Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto:

Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings. Lecture Notes in Computer Science 4575, Springer 2007, ISBN 978-3-540-73488-8
Invited Talk I
- Dan Boneh:

Bilinear Groups of Composite Order. 1
Applications
- Yong Ho Hwang, Pil Joong Lee:

Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. 2-22 - Benoît Libert, Jean-Jacques Quisquater:

Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. 23-38 - Cécile Delerablée, Pascal Paillier, David Pointcheval

:
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. 39-59
Certificateless Public Key Encryption
- Jong Hwan Park, Kyu Young Choi

, Jung Yeon Hwang, Dong Hoon Lee:
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). 60-82 - Zhaohui Cheng, Liqun Chen

, Li Ling, Richard Comley:
General and Efficient Certificateless Public Key Encryption Constructions. 83-107
Invited Talk II
- Steven D. Galbraith

, Florian Hess, Frederik Vercauteren
:
Hyperelliptic Pairings. 108-131
Hyperelliptic Curves
- Gabriel Cardona

, Enric Nart:
Zeta Function and Cryptographic Exponent of Supersingular Curves of Genus 2. 132-151 - David Freeman

:
Constructing Pairing-Friendly Genus 2 Curves with Ordinary Jacobians. 152-176
Invited Talk III
- Augusto Jun Devegili, Michael Scott, Ricardo Dahab

:
Implementing Cryptographic Pairings over Barreto-Naehrig Curves. 197-207
Implementation
- Tobias Vejda, Dan Page, Johann Großschädl:

Instruction Set Extensions for Pairing-Based Cryptography. 208-224 - Claire Whelan, Michael Scott:

The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks. 225-246
Protocol I
- Toshihiko Matsuo:

Proxy Re-encryption Systems for Identity-Based Encryption. 247-267 - Emeline Hufschmitt, Jacques Traoré:

Fair Blind Signatures Revisited. 268-292
Invited Talk IV
- Alfred Menezes:

Supersingular Elliptic Curves in Cryptography. 293
Analysis
- Laura Hitt:

On the Minimal Embedding Field. 294-301 - Shunji Kozaki, Taketeru Kutsuma, Kazuto Matsuo:

Remarks on Cheon's Algorithms for Pairing-Related Problems. 302-316
Invited Talk V
- Takakazu Satoh:

On Pairing Inversion Problems. 317-328
Algorithms
- Katherine E. Stange

:
The Tate Pairing Via Elliptic Nets. 329-348 - Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee

:
Eta Pairing Computation on General Divisors over Hyperelliptic Curves y2 = x7-x+/-1. 349-366
Protocol II
- Xinyi Huang, Yi Mu, Willy Susilo

, Wei Wu:
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. 367-391 - Fuchun Guo

, Yi Mu, Zhide Chen:
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. 392-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














