Public Key Cryptography – PKC 2008

11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

  • Editors
  • Ronald Cramer
Conference proceedings PKC 2008

DOI: 10.1007/978-3-540-78440-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4939)

Table of contents (22 papers)

  1. Front Matter
  2. Session I: Algebraic and Number Theoretical Cryptanalysis (I)

    1. Total Break of the ℓ-IC Signature Scheme
      Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern
      Pages 1-17
    2. Recovering NTRU Secret Key from Inversion Oracles
      Petros Mol, Moti Yung
      Pages 18-36
  3. Session II: Theory of Public Key Encryption

    1. Relations Among Notions of Plaintext Awareness
      James Birkett, Alexander W. Dent
      Pages 47-64
    2. Completely Non-malleable Encryption Revisited
      Carmine Ventre, Ivan Visconti
      Pages 65-84
  4. Invited Talk I

    1. Cryptographic Test Correction
      Eric Levieil, David Naccache
      Pages 85-100
  5. Session III: Digital Signatures (I)

    1. Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
      Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro
      Pages 101-120
    2. Proxy Signatures Secure Against Proxy Key Exposure
      Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson
      Pages 141-161
  6. Session IV: Identification, Broadcast and Key Agreement

    1. Efficient Simultaneous Broadcast
      Sebastian Faust, Emilia Käsper, Stefan Lucks
      Pages 180-196
    2. SAS-Based Group Authentication and Key Agreement Protocols
      Sven Laur, Sylvain Pasini
      Pages 197-213
  7. Session V: Implementation of Fast Arithmetic

  8. Session VI: Digital Signatures (II)

    1. Online-Untransferable Signatures
      Moses Liskov, Silvio Micali
      Pages 248-267
    2. Security of Digital Signature Schemes in Weakened Random Oracle Models
      Akira Numayama, Toshiyuki Isshiki, Keisuke Tanaka
      Pages 268-287
    3. A Digital Signature Scheme Based on CVP ∞ 
      Thomas Plantard, Willy Susilo, Khin Than Win
      Pages 288-307
  9. Session VII: Algebraic and Number Theoretical Cryptanalysis (II)

About these proceedings


Oracle Public Key RSA Session Signatur algorithm algorithms architecture authentication certificateless encryption cryptographic algorithms digital signature schemes elliptic curves encryption methods inversion oracles

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-78439-5
  • Online ISBN 978-3-540-78440-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349