Applications of Pairing Based Cryptography: Identity Based Encryption and Beyond

This workshop explores innovative and practical applications of pairing-based cryptography. Pairings have been used to create identity-based encryption schemes, but are also a useful tool for solving other cryptographic problems. We hope to encourage the development of new security applications and communication between researchers, developers and users.


Tuesday, June 3, 2008
8:00 am

Bus departs Gaithersburg Holiday Inn for NIST

8:30 am - 9:00 am Registration and Continental Breakfast
(Sponsored by Trend Micro)
9:00 am - 9:15 am Opening Remarks
National Institute of Standards and Technology
9:15 am - 10:00 am

Keynote I: An Introduction to Identity Based Encryption
Matt Franklin, University of California, Davis

10:00 am - 10:30 am

Session 1: Introduction
Session Chair: Andrew Regenscheid, NIST

A Roadmap of IBE Systems and their Applications
Xavier Boyen, Voltage

10:30 am - 11:00 am Break (Sponsored by Trend Micro)
11:00 am - 12:30 pm

Panel 1: Moving Forward with IBE
Moderator: Lily Chen, NIST

Douglas Maughan, DHS
Russ Housley, IETF
Andy Dancer, Trend Micro
Ingrum Putz, Voltage

12:30 pm - 2:00 pm Lunch [1.5 hours]
2:00 pm - 3:00 pm

Session 2: Protocols using IBE
Session Chair: Rene Peralta, NIST

Pairing-based Timed-Release Cryptography
Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, George Stephanides, University of Macedonia

Password Authenticated Key Exchange Protocols
Xun Yi, Victoria University
Raylin Tso, University of Tsukuba
Eiji Okamoto, University of Tsukuba

3:00 pm - 3:30 pm Break (Sponsored by Voltage Security)
3:30 pm - 5:00 pm

Session 3: Applications of Signatures
Session Chair: Ray Perlner, NIST

Outsourced Storage and Proofs of Retrievability
Hovav Shacham, UC San Diego
Brent Waters, SRI

Compact and Anonymous Role-Based Authorization Chains
Danfeng Yao, Rutgers
Roberto Tamassia, Brown University

Privacy Enhanced ID using Bilinear Pairings
Jiangtao Li, Ernie Brickell, Intel

5:00 pm - 5:30 pm

Session 4: Mathematical Background
Session Chair: Andrew Regenscheid, NIST

A Closer Look at Pairings
Luther Martin, Voltage

5:30 pm


Bus Departs for Gaithersburg Holiday Inn



Wednesday, June 4, 2008
8:15 am

Bus departs Gaithersburg Holiday Inn for NIST

8:30 am - 9:00 am Registration and Continental Breakfast
(Sponsored by Trend Micro)
9:00 am - 9:45 am Keynote II: Functional Encryption: Beyond Public Key Cryptography
Brent Waters, SRI
9:45 am - 10:45 am

Session 5: IBE Applications I
Session Chair: Tim Polk, NIST

Efficient Implementation of Pairing on Sensor Nodes
Tsukasa Ishiguro, Makaaki Shirase, Tsuyoshi Takagi, Future University Hakodate

Identity-Based Authentication in Session Initiation
Harsh Kupwade, Thomas Chen, Southern Methodist University
Dean Willis, Softarmor LLC
Nhut Nguyen, Samsung Telecommunications

10:45 am - 11:15 am Break
(Sponsored by Voltage Security)
11:15 am - 12:45 pm

Panel 2: Identity-Based Encryption: Is It Needed?
Moderator: Bill Burr, NIST

Brent Waters, SRI
Radia Perlman, Sun
Terence Spies, Voltage
Jon Callas, PGP

12:45 pm - 1:45 pm Lunch [1 hour]
1:45 pm - 2:45 pm

Session 6: IBE Applications II
Session Chair: Hildy Ferraiolo, NIST

Key Management for Stored Data
Terence Spies, Voltage

Secure Attribute Based Messaging Using ABE
Rakesh Bobba, Omid Fatemieh, Fariba Khan, Carl Gunter, Himanshu Khurana, Manoj Prabhakaran, University of Illinois
Arindam Khan, Indian Institute of Technology Kharagpur

2:45 pm - 3:15 pm

Session 7: IBE in the Marketplace
Session Chair: Hildy Ferraiolo, NIST

Understanding the Successes of IBE
Sathvik Krishnamurthy, Voltage

3:15 pm - 4:00 pm

Wrap Up
Bill Burr, National Institute of Standards and Technology

4:00 pm


Bus Departs for Gaithersburg Holiday Inn

Event Details

Starts: June 03, 2008 - 09:00 AM EST
Ends: June 04, 2008 - 04:00 PM EST

Format: In-person Type: Workshop

Attendance Type: Open to public
Audience Type: Industry,Government,Academia

Voltage Security
Trend Micro


Gaithersburg, MD

Parent Project

See: Pairing-Based Cryptography

Related Topics

Security and Privacy: encryption, identity & access management

Created January 24, 2017, Updated June 22, 2020