04400nam 2200661 450 99646533960331620211007175711.03-540-85538-610.1007/978-3-540-85538-5(CKB)1000000000490855(SSID)ssj0000319321(PQKBManifestationID)11265733(PQKBTitleCode)TC0000319321(PQKBWorkID)10337092(PQKB)11399216(DE-He213)978-3-540-85538-5(MiAaPQ)EBC3063536(MiAaPQ)EBC6511627(Au-PeEL)EBL6511627(OCoLC)1166255366(PPN)128126256(EXLCZ)99100000000049085520211007d2008 uy 0engurnn|008mamaatxtccrPairing-based cryptography - Pairing 2008 second international conference, Egham, UK, September 1-3, 2008 ; proceedings /Steven D. Galbraith, Kenneth G. Paterson (eds.)1st ed. 2008.Berlin, Germany ;New York, New York :Springer,[2008]©20081 online resource (XI, 377 p.) Security and Cryptology ;5209Includes index.3-540-85503-3 Includes bibliographical references and index.Invited Talks -- Pairings in Trusted Computing -- Pairing Lattices -- The Uber-Assumption Family -- Cryptography I -- Homomorphic Encryption and Signatures from Vector Decomposition -- Hidden-Vector Encryption with Groups of Prime Order -- Mathematics -- The Hidden Root Problem -- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography -- Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group -- Constructing Pairing Friendly Curves -- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field -- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials -- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties -- Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2?=?x 5?+?ax -- Implementation of Pairings -- Integer Variable ?–Based Ate Pairing -- Pairing Computation on Twisted Edwards Form Elliptic Curves -- Exponentiation in Pairing-Friendly Groups Using Homomorphisms -- Generators for the ?-Torsion Subgroup of Jacobians of Genus Two Curves -- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms -- Pairings on Hyperelliptic Curves with a Real Model -- Hardware Implementation -- Faster Implementation of ? T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition -- A Comparison between Hardware Accelerators for the Modified Tate Pairing over and -- Cryptography II -- One-Round ID-Based Blind Signature Scheme without ROS Assumption -- Tracing Malicious Proxies in Proxy Re-encryption -- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.Security and Cryptology ;5209Computer securityCongressesSets of pairs of functions to be distinguishedCongressesCryptographyCongressesComputer securitySets of pairs of functions to be distinguishedCryptography005.8254.62bclPaterson Kenneth G.1969-Galbraith Steven D.International Conference on Pairing-Based CryptographyMiAaPQMiAaPQMiAaPQBOOK996465339603316Pairing-Based Cryptography – Pairing 2008774467UNISA