The PairingBased Crypto Lounge 
Submission deadline:  March 6, 2009 
Notification of decision:  May 1, 2009 
Cameraready deadline:  May 22, 2009 
Conference:  August 1214, 2009 
Category  Author(s)  Ref. 

Key issuing 
Kim, Yang, Yoo 
[LBDKYY04] 
Signatures (plain, blind, proxy, ring, undeniable, ...) 

[AM04] [CC02] [CZK03b] [CHYC03] [CHYC04] [HS03] [H02a] [HWI03] [KH04] [LQ03c] [LWZH04] [P02a] [SOK00] [S03e] [SZM04] [XZCK03] [Y03b] [ZK02a] [ZK03] 
Encryption 

[BB04a] [BB04c] [BF01] [CHK03a] [HK04] [W04a] 
Authenticated encryption and signcryption 

[B03c] [CM04] [CYHC04] [LQ03a] [L02] [M02] [MB04a] [NR03b] [SK03] [YW04] 
Broadcast encryption 

[MSL03] 
Encryption with keyword search 
Ostrovsky, Persiano 
[BCOP04] 
Batch signatures 

[CKY04] 
Key agreement (plain, authenticated, group...) 

[BDS03] [BT04] [CK02] [CHL04] [DWGW03b] [DWGW03c] [LZC03] [MB04b] [N03] [NR02] [NR03a] [S02a] [S01] [S03a] [S03b] [SH03] [Y03a] [ZLK02] 
Trust authorities and public key certification 
Smart, Soldera 
[CHSS02] [CHMSS02] 
Hierarchical cryptosystems 

[CHK03a] [GS02] [HL02] [YL03] 
Threshold cryptosystems and signatures 

[BZ03] [CHY04] 
Chameleon hash and signatures 

[AM03] [DWGW03a] [ZSS03b] 
Authentication 

[KLY03] [ZK02b] 
Applications and systems 
Dalton, Harrison 
[CB03] [CBDH03] [CPB03] [BDD04] [KKA03] [M04b] 
Category  Author(s)  Ref. 

Access control 

[S02c] 
Key agreement 

[AP02] [BDS04] [BMP03] [BMP04] [CVC04] [J00] [LKKR03] [LZC04] [MP04] 
Noninteractive key distribution 

[DE02] 
Credentials (anonymous, hidden, selfblindable) and secret handshakes 
Smetters, Staddon, Wong 
[BDSSSW03] [BHS04] [CL04] [V01] 
Provably secure signatures 

[BMS03] 
Short signatures 

[BB04b] [BLS01] [ZSS04b] 
Group signatures 

[BBS04] [C02a] [CZK03a] [N04] 
Aggregate, ring, and verifiably encrypted signatures 

[BGLS03a] [LW03] [MNT04] [ZSS04a] 
Blind and partially blind signatures 

[B02a] [CHYC04] [ZSS04a] 
Proxy signatures 

[BPW03] [LWZ03b] [ZK03] [ZSL03] 
Undeniable signatures 

[HYW03] [ZSS03a] 
Signcryption 

[LQ04a] 
Multisignatures and threshold signatures 

[B02a] [CGHYC04] [LWZ03a] [VZK03] [W04b] 
Limitedverifier and designatedverifier signatures 

[CZK04a] [SBWP03] 
Threshold cryptosystems 

[LHKKI04] [LQ03b] 
Hierarchical and rolebased cryptosystems 

[TYW04] 
Chameleon hash and signatures 

[CZK04b] 
Verifiable random functions 

[D02] 
Strongly insulated encryption 

[BP02] 
Intrusionresilient encryption 
Miyaji, Yung 
[DFKMY03] 
Certificateless PKC 

[AP03] 
Traitor tracing 

[MSK02] [TSZ03] 
Identification Schemes 

[KKK02] 
Applications and systems 

[AL03] [EFS04] [SD03] 
Category  Author(s)  Ref. 

Decisional, Gap, and Bilinear DiffieHellman problems 

[CU02] [CL02] [GR04] [JN01] [OP01] [Y02] 
Tate/Weil pairing and multilinear forms 

[BS02] [FMR99] [FR94] [H02b] [J02] [L03] [MH03] [MOV93] [SU01] [S98] 
Pairing computation 

[BKLS02] [BLS03] [BMX04] [CL03] [CP01] [DL03] [ELM02] [ELM03] [GHS02a] [GPS04a] [GPS04b] [HDP04] [IT02] [SB04a] 
Pairingfriendly groups 

[BLS02] [BLS03] [BW03] [DEM02] [G02b] [MNT01] [PSV04] [RS02] [SB04b] 
Cryptanalysis of pairingbased schemes 

[C03] [C02b] [S04] [S03c] [S03d] [ZC03] [ZC04] [ZXF03] 
Security considerations 
Smart, Vercauteren 
[BNN04] [CHK03b] [GHS02b] [GMV04] [GHPSV04] [H04a] [H04b] [LQ04b] 
Related techniques 
Orlando, Paar, Wollinger 
[BGKOPW03] [DS98] [HPS02] [HFW03] [PS02] [RS04] 
Surveys 

[BGLS03b] [DBS04] [G03] [P02b] 
Theses 

[B02b] [B03a] [B03b] [G02a] [L04] [M04a] 
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z 