What's new?

  • Slides for invited talks have been updated! Please refer to here for more details.

Pairing2007, Tokyo

The first International Conference on Pairing-based Cryptography (Pairing 2007) will be held in Tokyo, Japan on July 2-4, 2007.


Since the introduction of pairings in constructive cryptographic applications, an ever increasing number of protocols have been appearing in the literature: identity-based encryption, short signature, and efficient broadcast encryption to mention but a few. An appropriate mix of theoretical foundations and practical considerations is essential to fully exploit the possibilities offered by pairings: number theory, cryptographic protocols, software and hardware implementations, new security applications, etc.

The aim of "Pairing 2007" is thus to bring together leading researchers and practitioners from academia and industry, all concerned with problems related to pairing-based cryptography. We hope that this conference will enhance communication among specialists from various research areas and promote creative interdisciplinary collaborations.

Authors are invited to submit papers describing their original research on all aspects of pairing-based cryptography, including, but not limited to the following topics:

Area I: Novel cryptographic protocols

  • ID-based cryptosystem
  • Broadcast encryption
  • Authenticated encryption
  • Short signature
  • Multi or aggregate signature
  • Ring, group or threshold signature
  • Designed confirmer or undeniable signature
  • Blind or partially blind signature
  • Identification scheme
  • Password authentication system
  • Key agreement protocol
  • Provably secure protocol

Area II: Mathematical foundation

  • Weil, Tate, Eta, and Ate pairings
  • Security consideration of pairing
  • Pairings on Abelian variety
  • Generation of pairing friendly curves
  • (Hyper-) Elliptic curve cryptosystem
  • Point counting algorithm
  • Number theoretic algorithms
  • Addition formula on the divisor group

Area III: SW/HW implementation

  • Secure operating system
  • Efficient software implementation
  • FPGA or ASIC implementation
  • Smart card implementation
  • RFID security
  • Middleware security
  • Side channel attack
  • Fault attack

Area IV: Applied security

  • Novel security applications
  • Secure ubiquitous computing
  • Security management
  • PKI model
  • Application to network security
  • Grid computing
  • Internet and web security
  • E-business or E-commerce security

Related Links