Call for Papers

The Call for Papers is also available for download as a PDF file.

The 6th International Conference on Pairing-Based Cryptography will be held in Beijing, China, 22nd -24th November 2013. The conference is sponsored by Information Security Center of Beijing University of Posts and Telecommunications, Chinese Association for Cryptologic Research, As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.

The first International Conference on Pairing-based Cryptography (Pairing 2007) was held in Tokyo, Japan, followed by Pairing 2008 in Egham, UK, Pairing 2009 in Palo Alto, USA, and Pairing 2010 in Yamanaka Hot Spring, Japan,Pairing 2012 in Cologne, Germany.

Paper submission

All submissions must be made using the online submission system and must conform to the instructions below.

Important Dates

        Submission deadline extended: September 3rd, 2013,23:59, GMT+8
        Paper submission deadline: August 20th, 2013,23:59, GMT+8
        Notifications to authors: October 18th, 2013
        Final version deadline: October 28th, 2013


The proceedings will be published in Springer's Lecture Notes in Computer Science
and will be sent to the participants after the conference.

Instructions for authors

Authors are invited to submit papers describing their original research on all aspects of pairing-based cryptography, including (but not limited to) the topics stated below. Submissions must not substantially duplicate work that any of the authors have published elsewhere or that has been submitted in parallel to any other conference or workshop. Submissions should be anonymous, with no author names, affiliations, acknowledgement or obvious references. Papers should be at most 18 pages, including the bibliography and appendices, using at least 11-point fonts and with reasonable margins. Committee members are not required to read appendices; the paper should be intelligible without them.

Submitted papers should follow the formatting instructions of the Springer LNCS Style. Please check the Information for LNCS Authors page at Springer for style and formatting guidelines. The final version of accepted papers should be at most 18 pages in standard LNCS style.

At least one author of each accepted paper must register with the conference and present the paper in order to be included in the proceedings.


Area I: Novel cryptographic protocols

  • ID-based and certificateless cryptosystems
  • Broadcast encryption, signcryption, etc
  • Short / multi / aggregate / group / ring / threshold / blind signatures
  • Designed confirmer or undeniable signatures
  • Identification / authentication schemes
  • Key agreement
  • Attribute-based encryption/Predicate encryption/Functional encryption
  • Searchable encryption/ (fully) homomorphic encryption/batch encryption
  • Predicate encryption

Area II: Mathematical foundations

  • Efficient pairing variants
  • Security consideration of pairings
  • Generation of pairing-friendly curves
  • Elliptic and hyperelliptic curves
  • Other pairings and applications of pairings in mathematics
  • Number-theoretic algorithms
  • Addition algorithms in divisor groups

Area III: SW / HW implementation

  • Secure operating systems
  • Efficient software implementation
  • FPGA or ASIC implementation
  • Smart-card implementation
  • RFID security
  • Middleware security
  • Side-channel and fault attacks

Area IV: Applied security

  • Novel security applications
  • Secure ubiquitous computing
  • Security management
  • PKI models
  • Application to network security
  • Grid computing
  • Internet and web security
  • E-business or E-commerce security
  • Cloud computing
  • Mobile and wireless network security
  • Application to sensor network security
  • Peer-to-peer security
  • Big-data security

Contact Us



Honorary chair:
Prof. Dingyi Pei, Guangzhou University

General Chairs:
Prof. Yixian Yang, Beijing University of Posts and Telecommunications
Prof. Xuejia Lai, Shanghai Jiao Tong University

Technical Program Committee Co-Chairs:
Prof. Zhenfu Cao, Shanghai Jiao Tong University
Prof. Fangguo Zhang, Sun Yat-sen University

Technical Program Committee Member:

Alice Silverberg

      U. C. Irvine


Atsuko Miyaji



Baocang Wang

      Xidian University


Chang-An Zhao

      Sun Yat-sen University


Damien Vergnaud

      École Normale Supérieur


Dario Fiore



Diego Aranha

      Adjunct Professor of Computer
      Science University of Brasília


Haifeng Qian

      East China Normal University


Jacob Schul

      Royal Holloway


Jin Li

      Guangzhou Universtiy


Jérémie Detrey



Jian Weng

      Jinan University


Junfeng Fan

      K.U. Leuven


Jun Shao

      Zhejiang Gongshang University


Katsuyuki Takashima

      Mitsubishi Electric


Kwangjo Kim



Liqun Chen

     Hewlett-Packard Laboratories


Lihua Wang



Michael Scott

     Certivox Ltd.


Mehdi Tibouchi

     Okamoto Research Laboratory


Paulo S. L. M. Barreto

     University of São Paulo


Peter Schwabe

     Academia Sinica


Sarah Meiklejohn

     University of California


Shengli Liu

     Shanghai Jiao Tong University


Sorina Ionica

     ENS Paris


Steven Galbraith

     University of Auckland

    New Zealand

Sylvain Duquesne

     Université Rennes


Takeshi Okamoto

     University of Tsukuba


Tanja Lange

     Technische Universiteit Eindhoven


Tsuyoshi Takagi

     Kyushu University


Xiaofeng Chen

     Xidian University


Xiaolei Dongn

     Shanghai Jiao Tong University


Zhenfeng Zhang

     Chinese Academy of Sciences


Organizing Committee:
Prof. Qun Luo, Beijing University of Posts and Telecommunications
Dr. Licheng Wang, Beijing University of Posts and Telecommunications

Organizing secretary:
Dr. Min Lei, Beijing University of Posts and Telecommunications