NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

Applications of Pairing Based Cryptography:
Identity Based Encryption and Beyond

Agenda
Subject to Change

Tuesday, June 3, 2008
8:00 am
Bus departs Gaithersburg Holiday Inn for NIST
8:30 am - 9:00 am Registration and Continental Breakfast
(Sponsored by Trend Micro)
9:00 am - 9:15 am Opening Remarks
National Institute of Standards and Technology
 
9:15 am - 10:00 am

Keynote I: An Introduction to Identity Based Encryption
Matt Franklin, University of California, Davis

10:00 am - 10:30 am
Session 1: Introduction
Session Chair: Andrew Regenscheid, NIST
 

A Roadmap of IBE Systems and their Applications
Xavier Boyen, Voltage

10:30 am - 11:00 am Break (Sponsored by Trend Micro)
11:00 am - 12:30 pm

Panel 1: Moving Forward with IBE
Moderator: Lily Chen, NIST

Douglas Maughan, DHS
Russ Housley, IETF
Andy Dancer, Trend Micro
Ingrum Putz, Voltage

12:30 pm - 2:00 pm Lunch [1.5 hours]
 
2:00 pm - 3:00 pm
Session 2: Protocols using IBE
Session Chair: Rene Peralta, NIST

Pairing-based Timed-Release Cryptography
Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, George Stephanides, University of Macedonia

Password Authenticated Key Exchange Protocols
Xun Yi, Victoria University
Raylin Tso, University of Tsukuba
Eiji Okamoto, University of Tsukuba

3:00 pm - 3:30 pm Break (Sponsored by Voltage Security)
 
3:30 pm - 5:00 pm Session 3: Applications of Signatures
Session Chair: Ray Perlner, NIST

 

Outsourced Storage and Proofs of Retrievability
Hovav Shacham, UC San Diego
Brent Waters, SRI

Compact and Anonymous Role-Based Authorization Chains
Danfeng Yao, Rutgers
Roberto Tamassia, Brown University

Privacy Enhanced ID using Bilinear Pairings
Jiangtao Li, Ernie Brickell, Intel

5:00 pm - 5:30 pm

Session 4: Mathematical Background
Session Chair: Andrew Regenscheid, NIST

  A Closer Look at Pairings
Luther Martin, Voltage
5:30 pm

Adjourn

Bus Departs for Gaithersburg Holiday Inn

 

Wednesday, June 4, 2008
8:15 am
Bus departs Gaithersburg Holiday Inn for NIST
8:30 am - 9:00 am Registration and Continental Breakfast
(Sponsored by Trend Micro)
9:00 am - 9:45 am Keynote II: Functional Encryption: Beyond Public Key Cryptography
Brent Waters, SRI
9:45 am - 10:45 am
Session 5: IBE Applications I
Session Chair: Tim Polk, NIST

Efficient Implementation of Pairing on Sensor Nodes
Tsukasa Ishiguro, Makaaki Shirase, Tsuyoshi Takagi, Future University Hakodate

Identity-Based Authentication in Session Initiation
Harsh Kupwade, Thomas Chen, Southern Methodist University
Dean Willis, Softarmor LLC
Nhut Nguyen, Samsung Telecommunications

10:45 am - 11:15 am Break
(Sponsored by Voltage Security)
11:15 am - 12:45 pm

Panel 2: Identity-Based Encryption: Is It Needed?
Moderator: Bill Burr, NIST

Brent Waters, SRI
Radia Perlman, Sun
Terence Spies, Voltage
Jon Callas, PGP

12:45 pm - 1:45 pm Lunch [1 hour]
 
1:45 pm - 2:45 pm
Session 6: IBE Applications II
Session Chair: Hildy Ferraiolo, NIST

Key Management for Stored Data
Terence Spies, Voltage

Secure Attribute Based Messaging Using ABE
Rakesh Bobba, Omid Fatemieh, Fariba Khan, Carl Gunter, Himanshu Khurana, Manoj Prabhakaran, University of Illinois
Arindam Khan, Indian Institute of Technology Kharagpur

2:45 pm - 3:15 pm

Session 7: IBE in the Marketplace
Session Chair: Hildy Ferraiolo, NIST

Understanding the Successes of IBE
Sathvik Krishnamurthy, Voltage

3:15 pm - 4:00 pm

Wrap Up
Bill Burr, National Institute of Standards and Technology

4:00 pm

Adjourn

Bus Departs for Gaithersburg Holiday Inn

 

* A Generic Model For Proxy-Protected Anonymous Proxy Cryptography , Guoyan Zhang, Key Lab of Cryptographic Technology and Information Security
Ministry of Education, School of Mathematics, Shandong University, P.R.China
[presentation accepted, but author unable to attend meeting]