Login [Center] Logout Join Us Guidelines  I  中文  I  CQI

Speaker: Yi Mu University of Wollongong, Australia
Time: 2008-06-11 15:00-2008-06-11 16:00
Venue: FIT Building 4-603, Tsinghua University
Download: Click!

Abstract:

In 1984, Shamir introduced the notion of identity-based cryptography in which the public key can be an arbitrary string. Identity-based cryptography has become a major research attraction after bilinear pairings were applied to identity-based cryptography by Sakai and Kasahara (2000) and later by Boneh and Franklin (2001) who invented a provable secure identity-based encryption scheme. Identity-based cryptography has attracted a lot of attention and a large volume of research papers have been published during the last 7 years. In this talk, I will introduce the notion of identity-based cryptography along with its major applications in encryption, signature, key exchange, and certificateless cryptography.

Short Bio:

Yi Mu received his PhD from the Australian National University in 1994. He currently is an associate professor in School of Computer Science and Software Engineering and the director of Centre for Computer and Information Security Research, University of Wollongong, Australia. Prior to joining University of Wollongong, he was a lecturer in the School of Computing and IT, University of Western Sydney, and a senior lecturer in the Department of Computing, Macquarie University. He has published over 180 research papers in various fields including information security, cryptography, and quantum informatics. He is the editor-in-chief of International Journal of Applied Cryptography and serves as editor for seven other international journals. He has served as a member of program committees for more than 80 international conferences. He is a senior member of the IEEE and a member of the IACR. Further information can be found from http://www.uow.edu.au/~ymu/.