Eintrag weiter verarbeiten

Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings

Gespeichert in:

Personen und Körperschaften: Joye, Marc (VerfasserIn), Miyaji, Atsuko (Sonstige), Otsuka, Akira (Sonstige)
Titel: Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings/ edited by Marc Joye, Atsuko Miyaji, Akira Otsuka
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2010
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 6487
Schlagwörter:
Buchausg. u.d.T.: Pairing-based cryptography - Pairing 2010, Berlin : Springer, 2010, XIII, 466 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 06876cam a22010212 4500
001 0-1650596758
003 DE-627
005 20240122105237.0
007 cr uuu---uuuuu
008 101203s2010 gw |||||o 00| ||eng c
020 |a 9783642174551  |9 978-3-642-17455-1 
024 7 |a 10.1007/978-3-642-17455-1  |2 doi 
035 |a (DE-627)1650596758 
035 |a (DE-576)334438942 
035 |a (DE-599)BSZ334438942 
035 |a (OCoLC)698517528 
035 |a (ZBM)1200.94008 
035 |a (DE-He213)978-3-642-17455-1 
035 |a (EBP)040531279 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE 
050 0 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 bicssc 
084 |a SS 4800  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *94-06  |2 msc 
084 |a 94A60  |2 msc 
084 |a 00B25  |2 msc 
084 |a 54.62  |2 bkl 
084 |a 54.38  |2 bkl 
100 1 |a Joye, Marc  |4 aut 
245 1 0 |a Pairing-Based Cryptography - Pairing 2010  |b 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings  |c edited by Marc Joye, Atsuko Miyaji, Akira Otsuka 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010 
300 |a Online-Ressource (XIII, 467p. 37 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 6487 
490 0 |a SpringerLink  |a Bücher 
520 |a Efficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation -- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves -- Invited Talk 1 -- Some Security Topics with Possible Applications for Pairing-Based Cryptography -- Digital Signatures -- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange -- Anonymizable Signature and Its Construction from Pairings -- Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication -- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares -- Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability -- Key Agreement -- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange -- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement -- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys -- Invited Talk 2 -- Pairing-Based Non-interactive Zero-Knowledge Proofs -- Applications: Code Generation, Time-Released Encryption, Cloud Computing -- Designing a Code Generator for Pairing Based Cryptographic Functions -- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability -- Optimal Authenticated Data Structures with Multilinear Forms -- Point Encoding and Pairing-Friendly Curves -- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves -- Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time -- A New Method for Constructing Pairing-Friendly Abelian Surfaces -- Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves -- ID-Based Encryption Schemes -- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks -- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts -- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman -- Invited Talk 3 -- A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties -- Efficient Hardware, FPGAs, and Algorithms -- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves -- A Variant of Miller’s Formula and Algorithm -- Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree -- High Speed Flexible Pairing Cryptoprocessor on FPGA Platform. 
650 0 |a Computer Communication Networks 
650 0 |a Computer software 
650 0 |a Computational complexity 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory 
650 0 |a Discrete mathematics. 
650 0 |a Information theory. 
650 0 |a Computer networks . 
650 0 |a Algorithms. 
650 0 |a Cryptography. 
655 7 |a Konferenzschrift  |y 2010  |z Kawamura-Yamanaka  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)7581976-4  |0 (DE-627)543941655  |0 (DE-576)271769076  |a Paarungsbasierte Kryptografie  |2 gnd 
689 0 |5 DE-101 
700 1 |a Miyaji, Atsuko  |4 oth 
700 1 |a Otsuka, Akira  |4 oth 
776 1 |z 9783642174544 
776 0 8 |i Buchausg. u.d.T.  |t Pairing-based cryptography - Pairing 2010  |d Berlin : Springer, 2010  |h XIII, 466 S.  |w (DE-627)63842593X  |w (DE-576)334755379  |z 364217454X  |z 9783642174544 
830 0 |a Lecture notes in computer science  |v 6487  |9 6487  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-17455-1  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://zbmath.org/?q=an:1200.94008  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC  |b 2010 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SCS  |b 2010 
912 |a ZDB-2-SXCS  |b 2010 
912 |a ZDB-2-SEB  |b 2010 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.62  |j Datenstrukturen  |q SEPA  |0 (DE-627)106403265 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
951 |a BO 
950 |a Pairing-based cryptography 
950 |a Kryptologie 
950 |a Kryptosystem 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-17455-1  |9 DE-14 
852 |a DE-14  |z 2011-07-20T14:57:52Z  |x epn:3337511872 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-17455-1  |9 DE-15 
852 |a DE-15  |z 2011-05-16T16:31:54Z  |x epn:3337511961 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-17455-1  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |z 2011-01-26T14:19:44Z  |x epn:3337512046 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-17455-1  |9 DE-520 
852 |a DE-520  |z 2010-12-03T09:53:11Z  |x epn:3337512100 
980 |a 1650596758  |b 0  |k 1650596758  |o 334438942 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Pairing-Based+Cryptography+-+Pairing+2010%3A+4th+International+Conference%2C+Yamanaka+Hot+Spring%2C+Japan%2C+December+2010.+Proceedings&rft.date=2010&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Pairing-Based+Cryptography+-+Pairing+2010%3A+4th+International+Conference%2C+Yamanaka+Hot+Spring%2C+Japan%2C+December+2010.+Proceedings&rft.series=Lecture+notes+in+computer+science%2C+6487&rft.au=Joye%2C+Marc&rft.pub=Springer+Berlin+Heidelberg&rft.edition=&rft.isbn=3642174558
SOLR
_version_ 1789362143815008256
access_facet Electronic Resources
author Joye, Marc
author2 Miyaji, Atsuko, Otsuka, Akira
author2_role oth, oth
author2_variant a m am, a o ao
author_facet Joye, Marc, Miyaji, Atsuko, Otsuka, Akira
author_role aut
author_sort Joye, Marc
author_variant m j mj
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
contents Efficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation -- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves -- Invited Talk 1 -- Some Security Topics with Possible Applications for Pairing-Based Cryptography -- Digital Signatures -- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange -- Anonymizable Signature and Its Construction from Pairings -- Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication -- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares -- Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability -- Key Agreement -- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange -- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement -- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys -- Invited Talk 2 -- Pairing-Based Non-interactive Zero-Knowledge Proofs -- Applications: Code Generation, Time-Released Encryption, Cloud Computing -- Designing a Code Generator for Pairing Based Cryptographic Functions -- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability -- Optimal Authenticated Data Structures with Multilinear Forms -- Point Encoding and Pairing-Friendly Curves -- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves -- Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time -- A New Method for Constructing Pairing-Friendly Abelian Surfaces -- Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves -- ID-Based Encryption Schemes -- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks -- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts -- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman -- Invited Talk 3 -- A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties -- Efficient Hardware, FPGAs, and Algorithms -- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves -- A Variant of Miller’s Formula and Algorithm -- Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree -- High Speed Flexible Pairing Cryptoprocessor on FPGA Platform.
ctrlnum (DE-627)1650596758, (DE-576)334438942, (DE-599)BSZ334438942, (OCoLC)698517528, (ZBM)1200.94008, (DE-He213)978-3-642-17455-1, (EBP)040531279
de15_date 2011-05-16T16:31:54Z
doi_str_mv 10.1007/978-3-642-17455-1
era_facet 2010
facet_912a ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Paarungsbasierte Kryptografie
finc_class_facet Informatik, Allgemeines, Mathematik
finc_id_str 0001455376
fincclass_txtF_mv science-computerscience
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2010 Kawamura-Yamanaka (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Kawamura-Yamanaka
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 6487
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1650596758
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer Berlin Heidelberg, 2010
imprint_str_mv Berlin, Heidelberg: Springer Berlin Heidelberg, 2010
institution DE-14, DE-Zi4, DE-520, DE-15
is_hierarchy_id 0-1650596758
is_hierarchy_title Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings
isbn 9783642174551
isbn_isn_mv 9783642174544, 364217454X
issn_isn_mv 1611-3349
kxp_id_str 1650596758
language English
last_indexed 2024-01-28T19:05:18.891Z
local_heading_facet_dezwi2 Computer Communication Networks, Computer software, Computational complexity, Computer Science, Computer science, Data protection, Data encryption (Computer science), Coding theory, Discrete mathematics., Information theory., Computer networks ., Algorithms., Cryptography., Paarungsbasierte Kryptografie
marc024a_ct_mv 10.1007/978-3-642-17455-1
match_str joye2010pairingbasedcryptographypairing20104thinternationalconferenceyamanakahotspringjapandecember2010proceedings
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)6487
oclc_num 698517528
physical Online-Ressource (XIII, 467p. 37 illus, digital)
publishDate 2010
publishDateSort 2010
publishPlace Berlin, Heidelberg
publisher Springer Berlin Heidelberg
record_format marcfinc
record_id 334438942
recordtype marcfinc
rsn_id_str_mv (DE-15)2462230
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 6487
series2 Lecture Notes in Computer Science ; 6487, SpringerLink ; Bücher
source_id 0
spelling Joye, Marc aut, Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings edited by Marc Joye, Atsuko Miyaji, Akira Otsuka, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (XIII, 467p. 37 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6487, SpringerLink Bücher, Efficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation -- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves -- Invited Talk 1 -- Some Security Topics with Possible Applications for Pairing-Based Cryptography -- Digital Signatures -- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange -- Anonymizable Signature and Its Construction from Pairings -- Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication -- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares -- Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability -- Key Agreement -- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange -- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement -- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys -- Invited Talk 2 -- Pairing-Based Non-interactive Zero-Knowledge Proofs -- Applications: Code Generation, Time-Released Encryption, Cloud Computing -- Designing a Code Generator for Pairing Based Cryptographic Functions -- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability -- Optimal Authenticated Data Structures with Multilinear Forms -- Point Encoding and Pairing-Friendly Curves -- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves -- Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time -- A New Method for Constructing Pairing-Friendly Abelian Surfaces -- Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves -- ID-Based Encryption Schemes -- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks -- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts -- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman -- Invited Talk 3 -- A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties -- Efficient Hardware, FPGAs, and Algorithms -- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves -- A Variant of Miller’s Formula and Algorithm -- Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree -- High Speed Flexible Pairing Cryptoprocessor on FPGA Platform., Computer Communication Networks, Computer software, Computational complexity, Computer Science, Computer science, Data protection, Data encryption (Computer science), Coding theory, Discrete mathematics., Information theory., Computer networks ., Algorithms., Cryptography., Konferenzschrift 2010 Kawamura-Yamanaka (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)7581976-4 (DE-627)543941655 (DE-576)271769076 Paarungsbasierte Kryptografie gnd, DE-101, Miyaji, Atsuko oth, Otsuka, Akira oth, 9783642174544, Buchausg. u.d.T. Pairing-based cryptography - Pairing 2010 Berlin : Springer, 2010 XIII, 466 S. (DE-627)63842593X (DE-576)334755379 364217454X 9783642174544, Lecture notes in computer science 6487 6487 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-17455-1 X:SPRINGER Verlag lizenzpflichtig Volltext, https://zbmath.org/?q=an:1200.94008 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://dx.doi.org/10.1007/978-3-642-17455-1 DE-14, DE-14 2011-07-20T14:57:52Z epn:3337511872, http://dx.doi.org/10.1007/978-3-642-17455-1 DE-15, DE-15 2011-05-16T16:31:54Z epn:3337511961, http://dx.doi.org/10.1007/978-3-642-17455-1 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:19:44Z epn:3337512046, http://dx.doi.org/10.1007/978-3-642-17455-1 DE-520, DE-520 2010-12-03T09:53:11Z epn:3337512100
spellingShingle Joye, Marc, Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings, Lecture notes in computer science, 6487, Efficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation -- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves -- Invited Talk 1 -- Some Security Topics with Possible Applications for Pairing-Based Cryptography -- Digital Signatures -- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange -- Anonymizable Signature and Its Construction from Pairings -- Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication -- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares -- Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability -- Key Agreement -- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange -- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement -- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys -- Invited Talk 2 -- Pairing-Based Non-interactive Zero-Knowledge Proofs -- Applications: Code Generation, Time-Released Encryption, Cloud Computing -- Designing a Code Generator for Pairing Based Cryptographic Functions -- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability -- Optimal Authenticated Data Structures with Multilinear Forms -- Point Encoding and Pairing-Friendly Curves -- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves -- Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time -- A New Method for Constructing Pairing-Friendly Abelian Surfaces -- Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves -- ID-Based Encryption Schemes -- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks -- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts -- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman -- Invited Talk 3 -- A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties -- Efficient Hardware, FPGAs, and Algorithms -- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves -- A Variant of Miller’s Formula and Algorithm -- Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree -- High Speed Flexible Pairing Cryptoprocessor on FPGA Platform., Computer Communication Networks, Computer software, Computational complexity, Computer Science, Computer science, Data protection, Data encryption (Computer science), Coding theory, Discrete mathematics., Information theory., Computer networks ., Algorithms., Cryptography., Konferenzschrift 2010 Kawamura-Yamanaka, Paarungsbasierte Kryptografie
swb_id_str 334438942
title Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings
title_auth Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings
title_full Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings edited by Marc Joye, Atsuko Miyaji, Akira Otsuka
title_fullStr Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings edited by Marc Joye, Atsuko Miyaji, Akira Otsuka
title_full_unstemmed Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings edited by Marc Joye, Atsuko Miyaji, Akira Otsuka
title_in_hierarchy 6487. Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings (2010)
title_short Pairing-Based Cryptography - Pairing 2010
title_sort pairing based cryptography pairing 2010 4th international conference yamanaka hot spring japan december 2010 proceedings
title_sub 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings
title_unstemmed Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings
topic Computer Communication Networks, Computer software, Computational complexity, Computer Science, Computer science, Data protection, Data encryption (Computer science), Coding theory, Discrete mathematics., Information theory., Computer networks ., Algorithms., Cryptography., Konferenzschrift 2010 Kawamura-Yamanaka, Paarungsbasierte Kryptografie
topic_facet Computer Communication Networks, Computer software, Computational complexity, Computer Science, Computer science, Data protection, Data encryption (Computer science), Coding theory, Discrete mathematics., Information theory., Computer networks ., Algorithms., Cryptography., Konferenzschrift, Paarungsbasierte Kryptografie
url https://doi.org/10.1007/978-3-642-17455-1, https://zbmath.org/?q=an:1200.94008, http://dx.doi.org/10.1007/978-3-642-17455-1