Pairing-Based Cryptography – Pairing 2012: 5th International by Xusheng Zhang, Kunpeng Wang, Dongdai Lin (auth.), Michel PDF

By Xusheng Zhang, Kunpeng Wang, Dongdai Lin (auth.), Michel Abdalla, Tanja Lange (eds.)

ISBN-10: 3642363334

ISBN-13: 9783642363337

ISBN-10: 3642363342

ISBN-13: 9783642363344

This ebook constitutes the refereed court cases of the fifth overseas convention on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in may perhaps 2012.
The 17 complete papers for presentation on the educational music and three complete papers for presentation on the commercial song have been conscientiously reviewed and chosen from forty nine submissions. those papers are offered including 6 invited talks. The contributions are prepared in topical sections on: algorithms for pairing computation, defense versions for encryption, practical encryption, implementations in and software program, song, houses of pairings, and signature schemes and applications.

Show description

Read or Download Pairing-Based Cryptography – Pairing 2012: 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers PDF

Similar cryptography books

Download e-book for iPad: Multimedia Encryption and Watermarking by Borko Furht, Edin Muharemagic, Daniel Socek

Multimedia Encryption and Watermarking provides a entire survey of up to date multimedia encryption and watermarking recommendations, which allow a safe trade of multimedia highbrow estate. half I, electronic Rights administration (DRM) for Multimedia, introduces DRM techniques and versions for multimedia content material security, and offers the major gamers.

The Information Security Dictionary Defining The Terms That - download pdf or read online

Whatever for everybody If this publication is to be successful and aid readers, its cardinal advantage has to be to supply an easy reference textual content. it may be a vital addition to a data defense library. As such it may additionally serve the aim of being a brief refresher for phrases the reader has no longer visible because the days while one attended a computing technological know-how application, details defense direction or workshop.

New PDF release: Public Key Cryptography - PKC 2010: 13th International

This e-book constitutes the refereed lawsuits of the thirteenth overseas convention on perform and concept in Public Key Cryptography, PKC 2010, held in Paris, France, in may well 2010. The 29 revised complete papers provided have been conscientiously reviewed and chosen from one hundred forty five submissions. The papers are geared up in topical sections on encryption; cryptanalysis; protocols; community coding; instruments; elliptic curves; lossy trapdoor features; discrete logarithm; and signatures.

Download PDF by Daniel J. Bernstein (auth.), Daniel J. Bernstein, Johannes: Post-Quantum Cryptography

Quantum pcs will holiday modern-day hottest public-key cryptographic platforms, together with RSA, DSA, and ECDSA. This ebook introduces the reader to the following new release of cryptographic algorithms, the platforms that withstand quantum-computer assaults: specifically, post-quantum public-key encryption platforms and post-quantum public-key signature platforms.

Additional resources for Pairing-Based Cryptography – Pairing 2012: 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers

Sample text

The affine representation Karabina Karabina 4 6 I1 + 9M1 I1 + 24M1 3M1 I1 + 9M1 6 24 log rM log 3 rM1 1 2 w+1 2w+1 1 bit 1 trit the trace representation this work this work 4 6 2I1 + 16M1 2I1 + 44M1 I1 + 3M1 4I1 + SqRt + 15M1 6 24 log rM log3 rM1 1 2 w+1 2w+1 2 bits 1 bit and 1 trit Factor-4 and 6 (De)Compression for Values of Pairings Using Trace Maps 31 the square root, to solve degree-3 equation, to transform the solution and to 2 +1 calculate γ. We explain solving degree-3 equation in detail.

19–34, 2013. c Springer-Verlag Berlin Heidelberg 2013 20 T. Yonemura et al. problem in a prime-order group. To compress the public-key size is to represent the prime-order group with fewer bits than the size of the embedding field. For instance, the recommended size of the finite field is 2048 bits, and the corresponding size of the prime-order group is 224 bits [2], because the discrete logarithm problem in the finite field is easier than in the general group, namely, the elliptic curve. The index calculus is a relatively efficient algorithm to solve the discrete logarithm problem in finite fields.

Let p = 3 and m be odd. An element of groups G± , #G± = pm ± 3pm + 1, is identified by an element of Fpm without distinction among conjugates. The compression map is as follows: T r6/1 : F(pm )6 → Fpm m m 2 g → g + g p + g (p ) m 3 + g (p ) m 4 + g (p ) m 5 + g (p ) . Since #G+ #G− = Φ6 (pm ), The groups G± are subgroups of T6 (Fpm ). Such subgroups are related to supersingular elliptic curves of embedding degree 6. 4 Construction of Decompression for Trace Maps We propose the decompressible trace representation with additional information.

Download PDF sample

Pairing-Based Cryptography – Pairing 2012: 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers by Xusheng Zhang, Kunpeng Wang, Dongdai Lin (auth.), Michel Abdalla, Tanja Lange (eds.)


by John
4.1

Rated 4.37 of 5 – based on 40 votes