Public Key Cryptography – PKC 2011

14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings

  • Dario Catalano
  • Nelly Fazio
  • Rosario Gennaro
  • Antonio Nicolosi
Conference proceedings PKC 2011

DOI: 10.1007/978-3-642-19379-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6571)

Table of contents (29 papers)

  1. Front Matter
  2. Signatures I

  3. Attribute Based Encryption

  4. Number Theory

    1. On the Correct Use of the Negation Map in the Pollard rho Method
      Daniel J. Bernstein, Tanja Lange, Peter Schwabe
      Pages 128-146
    2. Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
      Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi
      Pages 147-155
  5. Protocols

    1. (If) Size Matters: Size-Hiding Private Set Intersection
      Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik
      Pages 156-173
    2. Oblivious Transfer with Hidden Access Control Policies
      Jan Camenisch, Maria Dubovitskaya, Gregory Neven, Gregory M. Zaverucha
      Pages 192-209
  6. Chosen-Ciphertext Security

    1. Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited
      Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia
      Pages 210-227
    2. Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security
      Junzuo Lai, Robert H. Deng, Shengli Liu
      Pages 228-245
    3. Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks
      Takahiro Matsuda, Kanta Matsuura
      Pages 246-264
    4. Secure Blind Decryption
      Matthew Green
      Pages 265-282
  7. Invited Talk

  8. Encryption

    1. On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010
      Jian Weng, Yunlei Zhao, Goichiro Hanaoka
      Pages 284-295
    2. Fully Secure Accountable-Authority Identity-Based Encryption
      Amit Sahai, Hakan Seyalioglu
      Pages 296-316

About these proceedings

Introduction

This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011.
The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, protocols, chosen-ciphertext security, encryption, zero-knowledge, and cryptanalysis.

Keywords

authentication chosen ciphertext security cryptanalysis cryptographic algorithms cryptographic protocols elliptic curves identity-based encryption key exchange network coding oblivious transfer privacy provable security public key encrpytion security signatures

Editors and affiliations

  • Dario Catalano
    • 1
  • Nelly Fazio
    • 2
  • Rosario Gennaro
    • 3
  • Antonio Nicolosi
    • 4
  1. 1.Università di CataniaItaly
  2. 2.City University of New YorkUSA
  3. 3.IBM T.J. Watson Research Center HawthorneNew YorkUSA
  4. 4.Stevens Institute of TechnologyHobokenUSA

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-19378-1
  • Online ISBN 978-3-642-19379-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349