Public Key Cryptography – PKC 2010

13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings

  • Phong Q. Nguyen
  • David Pointcheval
Conference proceedings PKC 2010

DOI: 10.1007/978-3-642-13013-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6056)

Table of contents (29 papers)

  1. Front Matter
  2. Encryption I

    1. Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
      Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
      Pages 1-18
    2. Constant Size Ciphertexts in Threshold Attribute-Based Encryption
      Javier Herranz, Fabien Laguillaumie, Carla Ràfols
      Pages 19-34
  3. Cryptanalysis

    1. Algebraic Cryptanalysis of the PKC’2009 Algebraic Surface Cryptosystem
      Jean-Charles Faugère, Pierre-Jean Spaenlehauer
      Pages 35-52
    2. Implicit Factoring with Shared Most Significant and Middle Bits
      Jean-Charles Faugère, Raphaël Marinier, Guénaël Renault
      Pages 70-87
  4. Protocols I

    1. On the Feasibility of Consistent Computations
      Sven Laur, Helger Lipmaa
      Pages 88-106
    2. Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting
      Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang
      Pages 124-141
  5. Network Coding

    1. Secure Network Coding over the Integers
      Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
      Pages 142-160
    2. Preventing Pollution Attacks in Multi-source Network Coding
      Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman
      Pages 161-176
  6. Tools

    1. Groth–Sahai Proofs Revisited
      Essam Ghadafi, Nigel. P. Smart, Bogdan Warinschi
      Pages 177-192
  7. Elliptic Curves

    1. Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions
      Robert Granger, Michael Scott
      Pages 209-223
    2. Faster Pairing Computations on Curves with High-Degree Twists
      Craig Costello, Tanja Lange, Michael Naehrig
      Pages 224-242
    3. Efficient Arithmetic on Hessian Curves
      Reza R. Farashahi, Marc Joye
      Pages 243-260
  8. Lossy Trapdoor Functions

    1. CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model
      Toshihide Matsuda, Ryo Nishimaki, Keisuke Tanaka
      Pages 261-278
    2. More Constructions of Lossy and Correlation-Secure Trapdoor Functions
      David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev
      Pages 279-295
  9. Protocols II

About these proceedings


Proxy algebra authentication cryptanalysis cryptoanalysis cryptographic protocol cryptography elliptic curves encryption identity-based encryption network coding provable security security signatures simulation

Editors and affiliations

  • Phong Q. Nguyen
    • 1
  • David Pointcheval
    • 1
  1. 1.Département d’InformatiqueÉcole Normale SupérieureParis Cedex 05France

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-13012-0
  • Online ISBN 978-3-642-13013-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349