000 04154nam a22006735i 4500
001 978-3-540-73489-5
003 DE-He213
005 20240423125710.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 _a9783540734895
_9978-3-540-73489-5
024 7 _a10.1007/978-3-540-73489-5
_2doi
050 4 _aQA268
050 4 _aQ350-390
072 7 _aGPJ
_2bicssc
072 7 _aGPF
_2bicssc
072 7 _aCOM031000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aGPF
_2thema
082 0 4 _a003.54
_223
245 1 0 _aPairing-Based Cryptography - Pairing 2007
_h[electronic resource] :
_bFirst International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings /
_cedited by Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto.
250 _a1st ed. 2007.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2007.
300 _aXIII, 410 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4575
505 0 _aInvited Talk I -- Bilinear Groups of Composite Order -- Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System -- Practical Time Capsule Signatures in the Standard Model from Bilinear Maps -- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys -- Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles) -- General and Efficient Certificateless Public Key Encryption Constructions -- Invited Talk II -- Hyperelliptic Pairings -- Zeta Function and Cryptographic Exponent of Supersingular Curves of Genus 2 -- Constructing Pairing-Friendly Genus 2 Curves with Ordinary Jacobians -- Invited Talk III -- Implementing Cryptographic Pairings over Barreto-Naehrig Curves -- Instruction Set Extensions for Pairing-Based Cryptography -- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks -- Protocol I -- Proxy Re-encryption Systems for Identity-Based Encryption -- Fair Blind Signatures Revisited -- Invited Talk IV -- Supersingular Elliptic Curves in Cryptography -- On the Minimal Embedding Field -- Remarks on Cheon’s Algorithms for Pairing-Related Problems -- Invited Talk V -- On Pairing Inversion Problems -- The Tate Pairing Via Elliptic Nets -- Eta Pairing Computation on General Divisors over Hyperelliptic Curves y 2?=?x 7???x ±1 -- Protocol II -- Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length -- Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.
650 0 _aCoding theory.
650 0 _aInformation theory.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aAlgorithms.
650 0 _aComputer science
_xMathematics.
650 0 _aDiscrete mathematics.
650 1 4 _aCoding and Information Theory.
650 2 4 _aCryptology.
650 2 4 _aAlgorithms.
650 2 4 _aDiscrete Mathematics in Computer Science.
650 2 4 _aSymbolic and Algebraic Manipulation.
700 1 _aTakagi, Tsuyoshi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aOkamoto, Tatsuaki.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aOkamoto, Eiji.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aOkamoto, Takeshi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540734888
776 0 8 _iPrinted edition:
_z9783540840602
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4575
856 4 0 _uhttps://doi.org/10.1007/978-3-540-73489-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c180771
_d180771