This is a potential security issue, you are being redirected to https://csrc.nist.gov.
You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.
This workshop explores innovative and practical applications of pairing-based cryptography. Pairings have been used to create identity-based encryption schemes, but are also a useful tool for solving other cryptographic problems. We hope to encourage the development of new security applications and communication between researchers, developers and users.
Bus departs Gaithersburg Holiday Inn for NIST
Keynote I: An Introduction to Identity Based Encryption
Matt Franklin, University of California, Davis
Session 1: Introduction
Session Chair: Andrew Regenscheid, NIST
A Roadmap of IBE Systems and their Applications
Xavier Boyen, Voltage
Panel 1: Moving Forward with IBE
Moderator: Lily Chen, NIST
Douglas Maughan, DHS
Russ Housley, IETF
Andy Dancer, Trend Micro
Ingrum Putz, Voltage
Session 2: Protocols using IBE
Session Chair: Rene Peralta, NIST
Pairing-based Timed-Release Cryptography
Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, George Stephanides, University of Macedonia
Password Authenticated Key Exchange Protocols
Xun Yi, Victoria University
Raylin Tso, University of Tsukuba
Eiji Okamoto, University of Tsukuba
Session 3: Applications of Signatures
Session Chair: Ray Perlner, NIST
Outsourced Storage and Proofs of Retrievability
Hovav Shacham, UC San Diego
Brent Waters, SRI
Compact and Anonymous Role-Based Authorization Chains
Danfeng Yao, Rutgers
Roberto Tamassia, Brown University
Privacy Enhanced ID using Bilinear Pairings
Jiangtao Li, Ernie Brickell, Intel
Session 4: Mathematical Background
Session Chair: Andrew Regenscheid, NIST
A Closer Look at Pairings
Luther Martin, Voltage
Adjourn
Bus Departs for Gaithersburg Holiday Inn
Bus departs Gaithersburg Holiday Inn for NIST
Session 5: IBE Applications I
Session Chair: Tim Polk, NIST
Efficient Implementation of Pairing on Sensor Nodes
Tsukasa Ishiguro, Makaaki Shirase, Tsuyoshi Takagi, Future University Hakodate
Identity-Based Authentication in Session Initiation
Harsh Kupwade, Thomas Chen, Southern Methodist University
Dean Willis, Softarmor LLC
Nhut Nguyen, Samsung Telecommunications
Panel 2: Identity-Based Encryption: Is It Needed?
Moderator: Bill Burr, NIST
Brent Waters, SRI
Radia Perlman, Sun
Terence Spies, Voltage
Jon Callas, PGP
Session 6: IBE Applications II
Session Chair: Hildy Ferraiolo, NIST
Key Management for Stored Data
Terence Spies, Voltage
Secure Attribute Based Messaging Using ABE
Rakesh Bobba, Omid Fatemieh, Fariba Khan, Carl Gunter, Himanshu Khurana, Manoj Prabhakaran, University of Illinois
Arindam Khan, Indian Institute of Technology Kharagpur
Session 7: IBE in the Marketplace
Session Chair: Hildy Ferraiolo, NIST
Understanding the Successes of IBE
Sathvik Krishnamurthy, Voltage
Wrap Up
Bill Burr, National Institute of Standards and Technology
Adjourn
Bus Departs for Gaithersburg Holiday Inn
Starts: June 03, 2008 - 09:00 AM EDT
Ends: June 04, 2008 - 04:00 PM EDT
Format: In-person Type: Workshop
Attendance Type: Open to public Voltage Security
Audience Type: Industry,Government,Academia
Sponsors:
Trend Micro
NIST Gaithersburg, MD
Security and Privacy: encryption, identity & access management