This workshop explores innovative and practical applications of pairing-based cryptography. Pairings have been used to create identity-based encryption schemes, but are also a useful tool for solving other cryptographic problems. We hope to encourage the development of new security applications and communication between researchers, developers and users.
Tuesday, June 3, 2008
|
|
8:00 am |
Bus departs Gaithersburg Holiday Inn for NIST |
8:30 am - 9:00 am | Registration and Continental Breakfast (Sponsored by Trend Micro) |
9:00 am - 9:15 am | Opening Remarks National Institute of Standards and Technology |
9:15 am - 10:00 am |
Keynote I: An Introduction to Identity Based Encryption |
10:00 am - 10:30 am |
Session 1: Introduction A Roadmap of IBE Systems and their Applications |
10:30 am - 11:00 am | Break (Sponsored by Trend Micro) |
11:00 am - 12:30 pm |
Panel 1: Moving Forward with IBE Douglas Maughan, DHS |
12:30 pm - 2:00 pm | Lunch [1.5 hours] |
2:00 pm - 3:00 pm |
Session 2: Protocols using IBE Pairing-based Timed-Release Cryptography Password Authenticated Key Exchange Protocols |
3:00 pm - 3:30 pm | Break (Sponsored by Voltage Security) |
3:30 pm - 5:00 pm |
Session 3: Applications of Signatures Outsourced Storage and Proofs of Retrievability Compact and Anonymous Role-Based Authorization Chains Privacy Enhanced ID using Bilinear Pairings |
5:00 pm - 5:30 pm |
Session 4: Mathematical Background A Closer Look at Pairings |
5:30 pm |
Adjourn Bus Departs for Gaithersburg Holiday Inn |
Wednesday, June 4, 2008
|
|
8:15 am |
Bus departs Gaithersburg Holiday Inn for NIST |
8:30 am - 9:00 am | Registration and Continental Breakfast (Sponsored by Trend Micro) |
9:00 am - 9:45 am | Keynote II: Functional Encryption: Beyond Public Key Cryptography Brent Waters, SRI |
9:45 am - 10:45 am |
Session 5: IBE Applications I Efficient Implementation of Pairing on Sensor Nodes Identity-Based Authentication in Session Initiation |
10:45 am - 11:15 am | Break (Sponsored by Voltage Security) |
11:15 am - 12:45 pm |
Panel 2: Identity-Based Encryption: Is It Needed? Brent Waters, SRI |
12:45 pm - 1:45 pm | Lunch [1 hour] |
1:45 pm - 2:45 pm |
Session 6: IBE Applications II Key Management for Stored Data Secure Attribute Based Messaging Using ABE |
2:45 pm - 3:15 pm |
Session 7: IBE in the Marketplace Understanding the Successes of IBE |
3:15 pm - 4:00 pm |
Wrap Up |
4:00 pm |
Adjourn Bus Departs for Gaithersburg Holiday Inn |
Starts: June 03, 2008 - 09:00 AM EST
Ends: June 04, 2008 - 04:00 PM EST
Format: In-person Type: Workshop
Attendance Type: Open to public Voltage Security
Audience Type: Industry,Government,Academia
Sponsors:
Trend Micro
NIST Gaithersburg, MD
Security and Privacy: encryption, identity & access management