Pairing-Based Cryptography – Pairing 2009: Third by David Jao, Kayo Yoshida (auth.), Hovav Shacham, Brent Waters

Posted by

By David Jao, Kayo Yoshida (auth.), Hovav Shacham, Brent Waters (eds.)

This ebook constitutes the refereed lawsuits of the 3rd foreign convention on Pairing-Based Cryptography, Pairing 2009, held in Palo Alto, CA, united states, in August 2009.

The sixteen complete papers awarded have been conscientiously reviewed and chosen from 38 submissions. The papers are prepared in topical sections on signature protection, curves, pairing computation, non-interactive zero-knowledge platforms and purposes, staff signatures, and protocols.

Show description

Read or Download Pairing-Based Cryptography – Pairing 2009: Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings PDF

Best international conferences and symposiums books

Next Generation Information Technologies and Systems: 5th International Workshop, NGITS 2002 Caesarea, Israel, June 24–25, 2002 Proceedings

NGITS2002 was once the ? fth workshop of its style, selling papers that debate new applied sciences in details structures. Following the luck of the 4 p- vious workshops (1993, 1995, 1997, and 1999), the ? fth NGITS Workshop happened on June 24–25, 2002, within the historic urban of Caesarea. based on the decision for Papers, 22 papers have been submitted.

Knowledge Discovery in Inductive Databases: 4th International Workshop, KDID 2005, Porto, Portugal, October 3, 2005, Revised Selected and Invited Papers

The4thInternationalWorkshoponKnowledgeDiscoveryinInductiveDatabases (KDID 2005) was once held in Porto, Portugal, on October three, 2005 together with the sixteenth eu convention on desktop studying and the ninth eu convention on rules and perform of information Discovery in Databases. Ever because the commence of the ?

Rules and Rule Markup Languages for the Semantic Web: First International Conference, RuleML 2005, Galway, Ireland, November 10-12, 2005. Proceedings

RuleML 2005 was once the ? rst overseas convention on ideas and rule markup languages for the Semantic net, held at the side of the foreign Semantic net C- ference (ISWC) at Galway, eire. With the good fortune of the RuleML workshop sequence got here the necessity for prolonged examine and functions themes prepared in a convention structure.

Annual World Bank Conference on Development Economics-Europe 2003: Toward Pro-Poor Policies--Aid, Institutions, and Globalization

The once a year global financial institution convention on improvement Economics (ABCDE) brings jointly the world's best improvement thinkers to provide their views and ideas. lately, a parallel, moment convention has been held in Europe with a similar objective of increasing the circulate of principles among thinkers, practitioners, and policymakers within the box of foreign improvement.

Additional info for Pairing-Based Cryptography – Pairing 2009: Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings

Sample text

Definition 4 (Abuse-freeness). VES is abuse-free if for any efficient algorithm A the probability that experiment Abuse evaluates to 1 is negligible (as a function of n), where Experiment AbuseVES A (n) (apk, ask) ← AdjKg(1n ) (sk, pk) ← Kg(1n ) (m∗ , ω ∗ ) ← AC(sk,apk,·) (apk, ask, pk) Return 1 iff VesVf(apk, pk, ω ∗ , m∗ ) = 1 and A has never queried C(sk, apk, ·) about m∗ . 26 M. R¨ uckert and D. Schr¨ oder This definition can be strengthened even further as A could be allowed to choose the public key apk.

Experiment SOpacVES A (n) (sk, pk) ← Kg(1n ) (ask, apk) ← AdjKg(1n ) (m∗ , σ ∗ ) ← AC(sk,apk,·),A(ask,apk,pk,·,·) (pk, apk) Let A = {(mA1 , σA1 ), . . , (mA , σA )} be the query-answer pairs of A. Return 1 iff Vf(apk, σ ∗ , m∗ ) = 1 and (m∗ , σ ∗ ) ∈ A. Here again, as opposed to opacity, the adversary is allowed to query the oracles on the message it is about to output as a forgery. The forgery, however, must be different from what the adversary obtained from A on that message. Definition 12 (Strong Security of VES).

P. Le, A. Bonnecaze, and A. Gabillon Table 2. Chosen Message Attack against Multisignature in the Plain public-key model Experiment Expuu−cma (A) : MS params ← Setup(1k ); (sk∗ , pk∗ ) ← KGen(params); List ← ∅; Run A(params, pk∗ ), and for every signature query m made by A do the following: 1. List ← List ∪ {(m, L)}, where L is the list of users participating in signing the message m; 2. Execute protocol MSign on behalf of an honest player on inputs (params, m, sk∗ , L), forwarding messages to and from A.

Download PDF sample

Rated 4.55 of 5 – based on 23 votes