- Call for Papers - The 4th International Conference on Pairing-based Cryptography (Pairing 2010) December 13-15, 2010 Yamanaka Onsen (Hot Spring), Ishikawa, Japan Web Page: http://www.pairing-conference.org/ Contact: pairing2010-info@m.aist.go.jp [Overview] The focus of Pairing 2010 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, and applied security. The first International Conference on Pairing-based Cryptography (Pairing 2007) was held in Tokyo, Japan, followed by Egham, UK in 2008, and Palo Alto, USA in 2009. The next conference (Pairing 2010) will be held in Yamanaka Onsen (Hot Spring), Japan on December 13-15, 2010. For further information about the conference, visit http://www.pairing-conference.org/ . [Important Dates] Paper submission deadline: June 18, 2010, 23:59 JST Notification of acceptance: August 19, 2010 Final version deadline: September 13, 2010 Conference: December 13-15, 2010 [Motivation and Scope] Pairing-based cryptography is an extremely active area of research which has allowed elegant solutions to a number of long-standing open problems in cryptography (such as efficient identity-based encryption). New developments continue to be made at a rapid pace. To fully exploit the possibilities offered by pairings it is necessary to have an appropriate background in several theoretical and practical areas. In particular, the development of pairing based cryptography has been both driven and influenced by developments in number theory, algebraic geometry, cryptographic protocols, software and hardware implementations, new security applications, etc. The aim of "Pairing" conference is thus to bring together leading researchers and practitioners from academia and industry, all concerned with problems related to pairing-based cryptography. The first conference Pairing 2007 was held in Japan. The proceedings of Pairing 2007, 2008, and 2009 were published in Springer's LNCS 4575, 5209, and 5671, respectively. We hope that this conference will enhance communication among specialists from various research areas and promote creative interdisciplinary collaboration. Authors are invited to submit papers describing their original research on all aspects of pairing-based cryptography, including, but not limited to the following topics: Area I: Novel cryptographic protocols * ID-based and certificateless cryptosystems * Broadcast encryption, signcryption etc * Short/multi/aggregate/group/ring/threshold /blind signatures * Designed confirmer or undeniable signature * Identification /authentication schemes * Key agreement Area II: Mathematical foundations * Efficient Weil and Tate variants * Security consideration of pairings * Number theoretic algorithms * Generation of pairing friendly curves * Elliptic and hyperelliptic curves * Addition formula on the divisor group * Other pairings and applications of pairings in mathematics Area III: SW/HW implementation * Secure operating systems * Efficient software implementation * Smart card implementation * RFID security * Middleware security * Side channel and fault attacks * FPGA or ASIC implementation Area IV: Applied security * Novel security applications * Secure ubiquitous computing * Security management * PKI models * Application to network security * Grid computing * Internet and web security * E-business or E-commerce security * Cloud computing * Mobile and wireless network security * Application to sensor network security * Peer-to-peer security [Instructions for Authors] Submissions must not substantially duplicate work that any of the authors have published elsewhere or that have been submitted in parallel with any other conference or workshop. Submissions should be anonymous, with no author names, affiliations, acknowledgement or obvious references. Papers should be at most 16 pages, excluding the bibliography and appendices, and at most 20 pages in total, with at least 11pt font and reasonable margins. Committee members are not required to read the appendices; the paper should be intelligible without them. Submitted papers should follow the formatting instructions of the Springer LNCS Style. At least one author of each accepted paper must register with the conference and present the paper in order to be included in the proceedings. [Proceedings] The conference proceedings will be published in the Lecture Notes in Computer Science series by Springer Verlag (http://www.springer.com/lncs), and be available at the conference. [Conference Venue] Yamanaka Onsen (Hot Spring) was founded 1300 years ago. Magnificent natural sceneries and traditional cultures are still well-preserved in the area. For more information, visit http://www.yamanaka-spa.or.jp/english/welcome/index.html. [Committee and Organizers] Jointly Organized By: * National Institute of Advanced Industrial Science and Technology (AIST), Japan * Japan Advanced Institute of Science and Technology (JAIST), Japan Supported By: * Technical Committee on Information and Communication System Security (ICSS), IEICE, Japan * Technical Committee on Information Security (ISEC), IEICE, Japan Sponsored By: * Microsoft Research General Chair: * Akira Otsuka; AIST, Japan Program Co-Chairs: * Marc Joye; Technicolor, France * Atsuko Miyaji; JAIST, Japan Program Committee: * Michel Abdalla; Ecole Normale Superieure, France * Paulo S.L.M. Barreto; University of Sao Paulo, Brazil * Daniel Bernstein; University of Chicago, USA * Jean-Luc Beuchat; Tsukuba Univ., Japan * Xavier Boyen; Universite de Liege, Belgium * Ee-Chien Chang; National Univ. of Singapore, Singapore * Liqun Chen; HP Labs, UK * Reza Rezaeian Farashahi; Macquarie University, Australia * David Mandell Freeman; Stanford University, USA * Jun Furukawa; NEC Corporation, Japan * Craig Gentry; IBM Research, USA * Juan Gonzalez Nieto; Queensland U. Technology, Australia * Vipul Goyal; Microsoft Research, India * Shai Halevi; IBM Research, USA * Antoine Joux; U. Versailles & DGA, France * Jonathan Katz; University of Maryland, USA * Kwangjo Kim; KAIST, Korea * Kristin Lauter; Microsoft Research, USA * Pil Joong Lee; Pohang U. Science and Tech., Korea * Reynald Lercier; DGA/CELAR & U. Rennes 1, France * Benoit Libert; Univ. Catholique de Louvain, Belgium * Mark Manulis; TU Darmstadt, Germany * Giuseppe Persiano; Universita di Salerno, Italy * C. Pandu Rangan; IIT Madras, India * Christophe Ritzenthaler; IML, France * German Saez; UPC, Spain * Michael Scott; Dublin City University, Ireland * Alice Silverberg; University of California at Irvine, USA * Katsuyuki Takashima; Mitsubishi Electric, Japan * Keisuke Tanaka; Tokyo Institute of Technology, Japan * Edlyn Teske; University of Waterloo, Canada * Frederik Vercauteren; K.U. Leuven, Belgium * Bogdan Warinschi; University of Bristol, UK * Duncan S. Wong; City University of Hong Kong, China * Bo-Yin Yang; Academia Sinica, Taiwan * Sung-Ming Yen; National Central University, Taiwan * Fangguo Zhang; Sun Yat-sen University, P.R. China * Jianying Zhou; I2R, Singapore Organizing Committee: * Tomoyuki Asano; Sony, Japan * Nuttapong Attrapadung; AIST, Japan * Hiroshi Doi; IISEC, Japan * Goichiro Hanaoka; AIST, Japan * Mitsuhiro Hattori; Mitsubishi Electric, Japan * Shoichi Hirose; University of Fukui, Japan * Masaki Inamura; KDDI R&D Labs Inc., Japan * Atsuo Inomata; NAIST, Japan * Yasuharu Katsuno; IBM Research - Tokyo, Japan * Tetsutaro Kobayashi; NTT Labs, Japan * Toshihiko Matsuo; NTT Data, Japan * Natsume Matsuzaki; Panasonic, Japan * Hideyuki Miyake; Toshiba, Japan * Ryo Nojima; NICT, Japan * Takeshi Okamoto; Tsukuba U. of Technology, Japan * Katsuyuki Okeya; Hitachi, Japan * Kazumasa Omote; JAIST, Japan * Yuji Suga; IIJ, Japan * Tsuyoshi Takagi; Future Univ.-Hakodate, Japan * Dai Yamamoto; Fujitsu Laboratories, Japan * Toshihiro Yamauchi; Okayama University, Japan * Shoko Yonezawa; AIST, Japan