03369nam 2200553 450 991048414350332120220423135149.03-540-73489-910.1007/978-3-540-73489-5(CKB)1000000000490854(SSID)ssj0000319320(PQKBManifestationID)11222401(PQKBTitleCode)TC0000319320(PQKBWorkID)10337824(PQKB)10560139(DE-He213)978-3-540-73489-5(MiAaPQ)EBC3063304(MiAaPQ)EBC6694717(Au-PeEL)EBL6694717(PPN)12316351X(EXLCZ)99100000000049085420220423d2007 uy 0engurnn|008mamaatxtccrPairing-based cryptography - Pairing 2007 first international conference, Tokyo, Japan, July 2-4, 2007 : proceedings /Tsuyoshi Takagi [and three others]1st ed. 2007.Berlin ;Heidelberg :Springer-Verlag,[2007]℗♭20071 online resource (XIII, 410 p.) Lecture notes in computer science ;4575Bibliographic Level Mode of Issuance: Monograph3-540-73488-0 Invited Talk I -- Bilinear Groups of Composite Order -- Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System -- Practical Time Capsule Signatures in the Standard Model from Bilinear Maps -- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys -- Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles) -- General and Efficient Certificateless Public Key Encryption Constructions -- Invited Talk II -- Hyperelliptic Pairings -- Zeta Function and Cryptographic Exponent of Supersingular Curves of Genus 2 -- Constructing Pairing-Friendly Genus 2 Curves with Ordinary Jacobians -- Invited Talk III -- Implementing Cryptographic Pairings over Barreto-Naehrig Curves -- Instruction Set Extensions for Pairing-Based Cryptography -- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks -- Protocol I -- Proxy Re-encryption Systems for Identity-Based Encryption -- Fair Blind Signatures Revisited -- Invited Talk IV -- Supersingular Elliptic Curves in Cryptography -- On the Minimal Embedding Field -- Remarks on Cheon’s Algorithms for Pairing-Related Problems -- Invited Talk V -- On Pairing Inversion Problems -- The Tate Pairing Via Elliptic Nets -- Eta Pairing Computation on General Divisors over Hyperelliptic Curves y 2?=?x 7???x ±1 -- Protocol II -- Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length -- Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.Lecture notes in computer science ;4575.Computer securityCongressesComputer security005.8Takagi TsuyoshiInternational Conference on Pairing-Based CryptographyMiAaPQMiAaPQMiAaPQBOOK9910484143503321Pairing-Based Cryptography – Pairing 2007774269UNINA