Public Key Cryptography – PKC 2007

10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings


ISBN: 978-3-540-71676-1 (Print) 978-3-540-71677-8 (Online)

Table of contents (31 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Signatures I

    1. Book Chapter

      Pages 1-15

      Full-Domain Subgroup Hiding and Constant-Size Group Signatures

    2. Book Chapter

      Pages 16-30

      A Direct Anonymous Attestation Scheme for Embedded Devices

    3. Book Chapter

      Pages 31-42

      Anonymous Signatures Made Easy

    4. Book Chapter

      Pages 43-60

      On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures

  3. Invited Talk I

    1. Book Chapter

      Pages 61-75

      Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions

  4. Cryptanalysis

    1. Book Chapter

      Pages 76-88

      Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol

    2. Book Chapter

      Pages 89-106

      New Chosen-Ciphertext Attacks on NTRU

    3. Book Chapter

      Pages 107-117

      Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003

  5. Protocols I

    1. Book Chapter

      Pages 118-133

      Optimistic Fair Exchange in a Multi-user Setting

    2. Book Chapter

      Pages 134-149

      Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures

    3. Book Chapter

      Pages 150-165

      Knowledge-Binding Commitments with Applications in Time-Stamping

  6. Signatures II

    1. Book Chapter

      Pages 166-180

      Efficient Ring Signatures Without Random Oracles

    2. Book Chapter

      Pages 181-200

      Traceable Ring Signature

    3. Book Chapter

      Pages 201-216

      Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles

    4. Book Chapter

      Pages 217-232

      Improved On-Line/Off-Line Threshold Signatures

  7. Multivariate Cryptosystems

    1. Book Chapter

      Pages 233-248

      High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems

    2. Book Chapter

      Pages 249-265

      Cryptanalysis of HFE with Internal Perturbation

    3. Book Chapter

      Pages 266-281

      ℓ-Invertible Cycles for \(\mathcal{M}\) ultivariate \(\mathcal{Q}\) uadratic ( \({\mathcal{MQ}}\) ) Public Key Cryptography

  8. Encryption

    1. Book Chapter

      Pages 282-297

      Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman

    2. Book Chapter

      Pages 298-314

      Parallel Key-Insulated Public Key Encryption Without Random Oracles

previous Page of 2