Book Volume 1992 2001

Public Key Cryptography

4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13–15, 2001 Proceedings


ISBN: 978-3-540-41658-6 (Print) 978-3-540-44586-9 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XI

  2. Chapter

    Pages 1-18

    On the Security o a Williams Based Public Key Encryption Scheme

  3. Chapter

    Pages 19-35

    Semantically Secure McEliece Public-Key Cryptosystems -Conversions for McEliece PKC -

  4. Chapter

    Pages 36-47

    IND-CCA Public Key Schemes Equivalent to Factoring n =pq

  5. Chapter

    Pages 48-63

    Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite

  6. Chapter

    Pages 64-72

    On the Security o Lenstra’ s Variant o DSA without Long Inversions

  7. Chapter

    Pages 73-86

    Fast Irreducibility and Subgroup Membership Testing in XTR

  8. Chapter

    Pages 87-103

    A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes

  9. Chapter

    Pages 104-118

    The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes

  10. Chapter

    Pages 119-136

    A Generalisation, a Simpli.cation and Some Applications of Paillier's Probabilistic Public-Key System

  11. Chapter

    Pages 137-152

    Marking: A Privacy Protecting Approach Against Blackmailing

  12. Chapter

    Pages 153-164

    Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems

  13. Chapter

    Pages 165-172

    Cryptanalysis of PKP: A New Approach

  14. Chapter

    Pages 173-179

    Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures

  15. Chapter

    Pages 180-189

    Loopholes in Two Public Key Cryptosystems Using the Modular Group

  16. Chapter

    Pages 190-206

    Efficient Revocation in Group Signatures

  17. Chapter

    Pages 207-224

    A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares

  18. Chapter

    Pages 225-239

    Efficient Asymmetric Self-Enforcement Scheme with Public Traceability

  19. Chapter

    Pages 240-263

    Adaptive Security for the Additive-Sharing Based Proactive RSA

  20. Chapter

    Pages 264-276

    Robust Forward-Secure Signature Schemes with Proactive Security

  21. Chapter

    Pages 277-286

    Equitability in Retroactive Data Confiscation versus Proactive Key Escrow

previous Page of 2