Public Key Cryptography

4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13–15, 2001 Proceedings


ISBN: 978-3-540-41658-6 (Print) 978-3-540-44586-9 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XI

  2. Book Chapter

    Pages 1-18

    On the Security o a Williams Based Public Key Encryption Scheme

  3. Book Chapter

    Pages 19-35

    Semantically Secure McEliece Public-Key Cryptosystems -Conversions for McEliece PKC -

  4. Book Chapter

    Pages 36-47

    IND-CCA Public Key Schemes Equivalent to Factoring n =pq

  5. Book Chapter

    Pages 48-63

    Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite

  6. Book Chapter

    Pages 64-72

    On the Security o Lenstra’ s Variant o DSA without Long Inversions

  7. Book Chapter

    Pages 73-86

    Fast Irreducibility and Subgroup Membership Testing in XTR

  8. Book Chapter

    Pages 87-103

    A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes

  9. Book Chapter

    Pages 104-118

    The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes

  10. Book Chapter

    Pages 119-136

    A Generalisation, a Simpli.cation and Some Applications of Paillier's Probabilistic Public-Key System

  11. Book Chapter

    Pages 137-152

    Marking: A Privacy Protecting Approach Against Blackmailing

  12. Book Chapter

    Pages 153-164

    Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems

  13. Book Chapter

    Pages 165-172

    Cryptanalysis of PKP: A New Approach

  14. Book Chapter

    Pages 173-179

    Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures

  15. Book Chapter

    Pages 180-189

    Loopholes in Two Public Key Cryptosystems Using the Modular Group

  16. Book Chapter

    Pages 190-206

    Efficient Revocation in Group Signatures

  17. Book Chapter

    Pages 207-224

    A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares

  18. Book Chapter

    Pages 225-239

    Efficient Asymmetric Self-Enforcement Scheme with Public Traceability

  19. Book Chapter

    Pages 240-263

    Adaptive Security for the Additive-Sharing Based Proactive RSA

  20. Book Chapter

    Pages 264-276

    Robust Forward-Secure Signature Schemes with Proactive Security

  21. Book Chapter

    Pages 277-286

    Equitability in Retroactive Data Confiscation versus Proactive Key Escrow

previous Page of 2