Public Key Cryptography – PKC 2009

12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings

  • Stanisław Jarecki
  • Gene Tsudik
Conference proceedings PKC 2009

DOI: 10.1007/978-3-642-00468-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5443)

Table of contents (28 papers)

  1. Front Matter
  2. Number Theory

  3. Applications and Protocols

    1. Dan Boneh, David Freeman, Jonathan Katz, Brent Waters
      Pages 68-87
    2. Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
      Pages 88-104
    3. M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
      Pages 105-123
    4. Aggelos Kiayias, Hong-Sheng Zhou
      Pages 124-138
  4. Multi-Party Protocols

    1. Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval
      Pages 139-159
    2. Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen
      Pages 160-179
    3. Hossein Ghodosi, Josef Pieprzyk
      Pages 180-195
  5. Identity-Based Encryption

    1. Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy
      Pages 196-214
    2. Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki
      Pages 215-234
    3. Sherman S. M. Chow
      Pages 256-276
  6. Signatures

    1. Ivan Damgård, Gert Læssøe Mikkelsen
      Pages 277-296
    2. Marc Fischlin, Dominique Schröder
      Pages 297-316
    3. Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert et al.
      Pages 317-336

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009.

The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols, identity-based encryption, signatures, encryption, new cryptosystems and optimizations, as well as group signatures and anonymous credentials.

 

Keywords

Public Key anonymity authentication bit security certificateless encryption cryptanalysis cryptographic protocols cryptography digital signature schemes elliptic curves encryption methods group signatures identity optimization

Editors and affiliations

  • Stanisław Jarecki
    • 1
  • Gene Tsudik
    • 2
  1. 1.Department of Computer ScienceUniversity of CaliforniaIrvine 
  2. 2.Computer Science DepartmentUniversity of CaliforniaIrvine 

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-00467-4
  • Online ISBN 978-3-642-00468-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349