Public Key Cryptography

4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13–15, 2001 Proceedings

  • Kwangjo Kim
Conference proceedings PKC 2001

DOI: 10.1007/3-540-44586-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1992)

Table of contents (30 papers)

  1. Front Matter
    Pages I-XI
  2. IND-CCA Public Key Schemes Equivalent to Factoring n =pq
    Kaoru Kurosawa, Wakaha Ogata, Toshihiko Matsuo, Shuichi Makishima
    Pages 36-47
  3. On the Security o Lenstra’ s Variant o DSA without Long Inversions
    Arjen K. Lenstra, Igor E. Shparlinski
    Pages 64-72
  4. Fast Irreducibility and Subgroup Membership Testing in XTR
    Arjen K. Lenstra, Eric R. Verheul
    Pages 73-86
  5. Marking: A Privacy Protecting Approach Against Blackmailing
    Dennis Kügler, Holger Vogt
    Pages 137-152
  6. Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems
    Feng Bao, Robert H. Deng, Willi Geiselmann, Claus Schnorr, Rainer Steinwandt, Hongjun Wu
    Pages 153-164
  7. Cryptanalysis of PKP: A New Approach
    Éliane Jaulmes, Antoine Joux
    Pages 165-172
  8. Efficient Revocation in Group Signatures
    Emmanuel Bresson, Jacques Stern
    Pages 190-206
  9. Efficient Asymmetric Self-Enforcement Scheme with Public Traceability
    Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai
    Pages 225-239
  10. Adaptive Security for the Additive-Sharing Based Proactive RSA
    Yair Frankel, Philip D. MacKenzie, Moti Yung
    Pages 240-263
  11. Robust Forward-Secure Signature Schemes with Proactive Security
    Wen-Guey Tzeng, Zhi-Jia Tzeng
    Pages 264-276

About these proceedings


This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, held in Cheju Island, Korea in February 2001.
The 30 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers address all current issues in public key cryptography, ranging from mathematical foundations to implementation issues.


Digital Signature Schemes Elliptic Curve Cryptosystems Escrow Factorization Public Key Cryptography Public Key Cryptosystems RSA RSA Cryptography Random Numbers Signatur Signcryption Symmetric Cryptography cryptography finite field security

Editors and affiliations

  • Kwangjo Kim
    • 1
  1. 1.Information and Communications University,Information Security GroupTaejonKorea

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-41658-6
  • Online ISBN 978-3-540-44586-9
  • Series Print ISSN 0302-9743