Also available for download as a PDF file.
Monday, December 13, 2010 | |
---|---|
09:00 – 10:00 | Registration |
10:00 – 10:10 | Opening remarks |
Session 1 – Efficient software implementation Chair: Christophe Ritzenthaler |
|
10:10 – 10:35 | An Analysis of Affine Coordinates for Pairing Computation |
Kristin Lauter, Peter L. Montgomery, and Michael Naehrig | |
10:35 – 11:00 | High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves |
Jean-Luc Beuchat, Jorge E. Gonzalez-Diaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, and Tadanori Teruya | |
Keynote talk I Chair: Akira Otsuka |
|
11:00 – 12:00 | Some Security Topics with Possible Applications for Pairing-Based Cryptography |
Gene Tsudik | |
12:00 – 14:00 | Lunch and Excursion (Writing and enjoying Japanese poetry -Haiku-) at Basho-no-Yakata Museum |
Session 2 – Digital signatures Chair: Fabien Laguillaumie |
|
14:00 – 14:25 | A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange |
Qiong Huang, Duncan S. Wong, and Willy Susilo | |
14:25 – 14:50 | Anonymizable Signature and its Construction from Pairings |
Fumitaka Hoshino, Tetsutaro Kobayashi, and Koutarou Suzuki | |
14:50 – 15:15 | Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches |
Brian J. Matt | |
15:15 – 15:45 | Coffee break |
Session 3 – Cryptographic protocols Chair: Brian Matt |
|
15:45 – 16:10 | Oblivious Transfer with Access Control: Realizing Disjunction without Duplication |
Ye Zhang, Man Ho Au, Duncan S. Wong, Qiong Huang, Nikos Mamoulis, David W. Cheung, and Siu-Ming Yiu | |
16:10 – 16:35 | Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices that Cannot Store Shares |
Koen Simoens, Roel Peeters, and Bart Preneel | |
16:35 – 17:00 | Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability |
Lingbo Wei and Jianwei Liu | |
19:00 – 21:00 | Dinner with "Noh" and "Kyogen" at Yamanaka-za |
Tuesday, December 14, 2010 | |
09:00 – 09:15 | Registration |
Session 4 – Key agreement Chair: Katsuyuki Takashima |
|
09:15 – 09:40 | Strongly Secure Two-Pass Attribute-based Authenticated Key Exchange |
Kazuki Yoneyama | |
09:40 – 10:05 | Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement |
Dario Fiore, Rosario Gennaro, and Nigel P. Smart | |
10:05 – 10:30 | Ephemeral Key Leakage Resilient and Efficient ID-AKEs that can Share Identities, Private and Master Keys |
Atsushi Fujioka, Koutarou Suzuki, and Berkant Ustaoglu | |
10:30 – 11:00 | Coffee break |
Keynote talk II Chair: Marc Joye |
|
11:00 – 12:00 | Pairing-Based Non-interactive Zero-Knowledge Proofs () () |
Jens Groth | |
12:00 – 14:00 | Lunch and Excursion (Tea Ceremony) at Mugen-an |
Session 5 – Applications: code generation,
time-released encryption, cloud computing Chair: David Galindo |
|
14:00 – 14:25 | Designing a Code Generator for Pairing Based Cryptographic Functions |
Luis J. Dominguez Perez and Michael Scott | |
14:25 – 14:50 | Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability |
Takahiro Matsuda, Yasumasa Nakai, and Kanta Matsuura | |
14:50 – 15:15 | Optimal Authenticated Data Structures with Multilinear Forms |
Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos | |
15:15 – 15:45 | Coffee break |
Session 6 – Point encoding &
Pairing-friendly curves Chair: Michael Naehrig |
|
15:45 – 16:10 | Deterministic Encoding and Hashing to Odd Hyperelliptic Curves |
Pierre-Alain Fouque and Mehdi Tibouchi | |
16:10 – 16:35 | Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time |
Jean-Gabriel Kammerer, Reynald Lercier, and Guénaël Renault | |
16:35 – 17:00 | A New Method for Constructing Pairing-Friendly Abelian Surfaces |
Robert Drylo | |
17:00 – 17:35 | Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves |
Ezekiel J. Kachisa | |
19:00 – 21:00 | Dinner at Kajikaso Royal Hotel |
Wednesday, December 15, 2010 | |
09:00 – 09:15 | Registration |
Session 7 – ID-based encryption schemes Chair: Phong Nguyen |
|
09:15 – 09:40 | New Identity-Based Proxy Re-Encryption Schemes to Prevent Collusion Attacks |
Lihua Wang, Licheng Wang, Masahiro Mambo and Eiji Okamoto | |
09:40 – 10:05 | Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts |
Angelo De Caro, Vincenzo Iovino, and Giuseppe Persiano | |
10:05 – 10:30 | Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffe-Hellman |
David Galindo | |
10:30 – 11:00 | Coffee break |
Keynote talk III Chair:
Atsuko Miyaji |
|
11:00 – 12:00 | A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties () |
Joseph H. Silverman | |
12:00 – 13:30 | Lunch |
Session 8 – Efficient Hardware, FPGAs, and
algorithms Chair: Katsuyuki Okeya |
|
13:30 – 13:55 | Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves |
Nicolas Estibals | |
13:55 – 14:20 | A Variant of Miller's Formula and Algorithm |
John Boxall, Nadia El Mrabet, Fabien Laguillaumie, and Duc-Phong Le | |
14:20 – 14:45 | Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree |
Sorina Ionica and Antoine Joux | |
14:45 – 15:10 | High Speed Flexible Pairing Cryptoprocessor on FPGA Platform |
Santosh Ghosh, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury | |
15:10 – 15:20 | Closing remarks |