
Also
available for download as a
PDF file.
| Monday, December 13, 2010 | |
|---|---|
| 09:00 – 10:00 | Registration |
| 10:00 – 10:10 | Opening remarks |
| Session 1 – Efficient software implementation Chair: Christophe Ritzenthaler |
|
| 10:10 – 10:35 | An Analysis of Affine Coordinates for Pairing Computation |
| Kristin Lauter, Peter L. Montgomery, and Michael Naehrig | |
| 10:35 – 11:00 | High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves |
| Jean-Luc Beuchat, Jorge E. Gonzalez-Diaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, and Tadanori Teruya | |
| Keynote talk I Chair: Akira Otsuka |
|
| 11:00 – 12:00 | Some Security Topics with Possible Applications for Pairing-Based Cryptography |
| Gene Tsudik | |
| 12:00 – 14:00 | Lunch and Excursion (Writing and enjoying Japanese poetry -Haiku-) at Basho-no-Yakata Museum |
| Session 2 – Digital signatures Chair: Fabien Laguillaumie |
|
| 14:00 – 14:25 | A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange |
| Qiong Huang, Duncan S. Wong, and Willy Susilo | |
| 14:25 – 14:50 | Anonymizable Signature and its Construction from Pairings |
| Fumitaka Hoshino, Tetsutaro Kobayashi, and Koutarou Suzuki | |
| 14:50 – 15:15 | Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches |
| Brian J. Matt | |
| 15:15 – 15:45 | Coffee break |
| Session 3 – Cryptographic protocols Chair: Brian Matt |
|
| 15:45 – 16:10 | Oblivious Transfer with Access Control: Realizing Disjunction without Duplication |
| Ye Zhang, Man Ho Au, Duncan S. Wong, Qiong Huang, Nikos Mamoulis, David W. Cheung, and Siu-Ming Yiu | |
| 16:10 – 16:35 | Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices that Cannot Store Shares |
| Koen Simoens, Roel Peeters, and Bart Preneel | |
| 16:35 – 17:00 | Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability |
| Lingbo Wei and Jianwei Liu | |
| 19:00 – 21:00 | Dinner with "Noh" and "Kyogen" at Yamanaka-za |
| Tuesday, December 14, 2010 | |
| 09:00 – 09:15 | Registration |
| Session 4 – Key agreement Chair: Katsuyuki Takashima |
|
| 09:15 – 09:40 | Strongly Secure Two-Pass Attribute-based Authenticated Key Exchange |
| Kazuki Yoneyama | |
| 09:40 – 10:05 | Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement |
| Dario Fiore, Rosario Gennaro, and Nigel P. Smart | |
| 10:05 – 10:30 | Ephemeral Key Leakage Resilient and Efficient ID-AKEs that can Share Identities, Private and Master Keys |
| Atsushi Fujioka, Koutarou Suzuki, and Berkant Ustaoglu | |
| 10:30 – 11:00 | Coffee break |
| Keynote talk II Chair: Marc Joye |
|
| 11:00 – 12:00 | Pairing-Based
Non-interactive Zero-Knowledge Proofs
( )
( ) |
| Jens Groth | |
| 12:00 – 14:00 | Lunch and Excursion (Tea Ceremony) at Mugen-an |
| Session 5 – Applications: code generation,
time-released encryption, cloud computing Chair: David Galindo |
|
| 14:00 – 14:25 | Designing a Code Generator for Pairing Based Cryptographic Functions |
| Luis J. Dominguez Perez and Michael Scott | |
| 14:25 – 14:50 | Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability |
| Takahiro Matsuda, Yasumasa Nakai, and Kanta Matsuura | |
| 14:50 – 15:15 | Optimal Authenticated Data Structures with Multilinear Forms |
| Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos | |
| 15:15 – 15:45 | Coffee break |
| Session 6 – Point encoding &
Pairing-friendly curves Chair: Michael Naehrig |
|
| 15:45 – 16:10 | Deterministic Encoding and Hashing to Odd Hyperelliptic Curves |
| Pierre-Alain Fouque and Mehdi Tibouchi | |
| 16:10 – 16:35 | Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time |
| Jean-Gabriel Kammerer, Reynald Lercier, and Guénaël Renault | |
| 16:35 – 17:00 | A New Method for Constructing Pairing-Friendly Abelian Surfaces |
| Robert Drylo | |
| 17:00 – 17:35 | Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves |
| Ezekiel J. Kachisa | |
| 19:00 – 21:00 | Dinner at Kajikaso Royal Hotel |
| Wednesday, December 15, 2010 | |
| 09:00 – 09:15 | Registration |
| Session 7 – ID-based encryption schemes Chair: Phong Nguyen |
|
| 09:15 – 09:40 | New Identity-Based Proxy Re-Encryption Schemes to Prevent Collusion Attacks |
| Lihua Wang, Licheng Wang, Masahiro Mambo and Eiji Okamoto | |
| 09:40 – 10:05 | Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts |
| Angelo De Caro, Vincenzo Iovino, and Giuseppe Persiano | |
| 10:05 – 10:30 | Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffe-Hellman |
| David Galindo | |
| 10:30 – 11:00 | Coffee break |
| Keynote talk III Chair:
Atsuko Miyaji |
|
| 11:00 – 12:00 | A Survey of Local and
Global Pairings on Elliptic Curves and Abelian Varieties
( ) |
| Joseph H. Silverman | |
| 12:00 – 13:30 | Lunch |
| Session 8 – Efficient Hardware, FPGAs, and
algorithms Chair: Katsuyuki Okeya |
|
| 13:30 – 13:55 | Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves |
| Nicolas Estibals | |
| 13:55 – 14:20 | A Variant of Miller's Formula and Algorithm |
| John Boxall, Nadia El Mrabet, Fabien Laguillaumie, and Duc-Phong Le | |
| 14:20 – 14:45 | Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree |
| Sorina Ionica and Antoine Joux | |
| 14:45 – 15:10 | High Speed Flexible Pairing Cryptoprocessor on FPGA Platform |
| Santosh Ghosh, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury | |
| 15:10 – 15:20 | Closing remarks |