Book Volume 5443 2009

Public Key Cryptography – PKC 2009

12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings


ISBN: 978-3-642-00467-4 (Print) 978-3-642-00468-1 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Number Theory

    1. Chapter

      Pages 1-14

      Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint

    2. Chapter

      Pages 15-33

      The Security of All Bits Using List Decoding

    3. Chapter

      Pages 34-53

      A New Lattice Construction for Partial Key Exposure Attack for RSA

    4. Chapter

      Pages 54-67

      Subset-Restricted Random Walks for Pollard rho Method on \({\mathbf{F}_{p^m}}\)

  3. Applications and Protocols

    1. Chapter

      Pages 68-87

      Signing a Linear Subspace: Signature Schemes for Network Coding

    2. Chapter

      Pages 88-104

      Improving the Boneh-Franklin Traitor Tracing Scheme

    3. Chapter

      Pages 105-123

      Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols

    4. Chapter

      Pages 124-138

      Zero-Knowledge Proofs with Witness Elimination

  4. Multi-Party Protocols

    1. Chapter

      Pages 139-159

      Distributed Public-Key Cryptography from Weak Secrets

    2. Chapter

      Pages 160-179

      Asynchronous Multiparty Computation: Theory and Implementation

    3. Chapter

      Pages 180-195

      Multi-Party Computation with Omnipresent Adversary

  5. Identity-Based Encryption

    1. Chapter

      Pages 196-214

      Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data

    2. Chapter

      Pages 215-234

      Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts

    3. Chapter

      Pages 235-255

      Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    4. Chapter

      Pages 256-276

      Removing Escrow from Identity-Based Encryption

  6. Signatures

    1. Chapter

      Pages 277-296

      On the Theory and Practice of Personal Digital Signatures

    2. Chapter

      Pages 297-316

      Security of Blind Signatures under Aborts

    3. Chapter

      Pages 317-336

      Security of Sanitizable Signatures Revisited

    4. Chapter

      Pages 337-356

      Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures

  7. Encryption

    1. Chapter

      Pages 357-376

      CCA-Secure Proxy Re-encryption without Pairings

previous Page of 2