LEADER 04916nam 22008535 450 001 9910484143503321 005 20251226202902.0 010 $a3-540-73489-9 024 7 $a10.1007/978-3-540-73489-5 035 $a(CKB)1000000000490854 035 $a(SSID)ssj0000319320 035 $a(PQKBManifestationID)11222401 035 $a(PQKBTitleCode)TC0000319320 035 $a(PQKBWorkID)10337824 035 $a(PQKB)10560139 035 $a(DE-He213)978-3-540-73489-5 035 $a(MiAaPQ)EBC3063304 035 $a(MiAaPQ)EBC6694717 035 $a(Au-PeEL)EBL6694717 035 $a(PPN)12316351X 035 $a(MiAaPQ)EBC337154 035 $a(BIP)34164909 035 $a(BIP)14226089 035 $a(EXLCZ)991000000000490854 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPairing-Based Cryptography - Pairing 2007 $eFirst International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings /$fedited by Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XIII, 410 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4575 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-73488-0 327 $aInvited Talk I -- Bilinear Groups of Composite Order -- Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System -- Practical Time Capsule Signatures in the Standard Model from Bilinear Maps -- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys -- Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles) -- General and Efficient Certificateless Public Key Encryption Constructions -- Invited Talk II -- Hyperelliptic Pairings -- Zeta Function and Cryptographic Exponent of Supersingular Curves of Genus 2 -- Constructing Pairing-Friendly Genus 2 Curves with Ordinary Jacobians -- Invited Talk III -- Implementing Cryptographic Pairings over Barreto-Naehrig Curves -- Instruction Set Extensions for Pairing-Based Cryptography -- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks -- Protocol I -- Proxy Re-encryption Systems for Identity-Based Encryption -- Fair Blind Signatures Revisited -- Invited Talk IV -- Supersingular Elliptic Curves in Cryptography -- On the Minimal Embedding Field -- Remarks on Cheon?s Algorithms for Pairing-Related Problems -- Invited Talk V -- On Pairing Inversion Problems -- The Tate Pairing Via Elliptic Nets -- Eta Pairing Computation on General Divisors over Hyperelliptic Curves y 2?=?x 7???x ±1 -- Protocol II -- Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length -- Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. 330 $aPairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book all the more relevant, being as it is the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in 2007. The 18 revised full papers presented together were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections including those on applications, and certificateless public key encryption. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4575 606 $aCoding theory 606 $aInformation theory 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCoding and Information Theory 606 $aCryptology 606 $aAlgorithms 606 $aDiscrete Mathematics in Computer Science 606 $aSymbolic and Algebraic Manipulation 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCoding and Information Theory. 615 24$aCryptology. 615 24$aAlgorithms. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aSymbolic and Algebraic Manipulation. 676 $a005.8 702 $aTakagi$b Tsuyoshi 712 12$aInternational Conference on Pairing-Based Cryptography 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484143503321 996 $aPairing-Based Cryptography – Pairing 2007$9774269 997 $aUNINA