Book Volume 6571 2011

Public Key Cryptography – PKC 2011

14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings

ISBN: 978-3-642-19378-1 (Print) 978-3-642-19379-8 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Signatures I

    1. Chapter

      Pages 1-16

      Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures

    2. Chapter

      Pages 17-34

      Homomorphic Network Coding Signatures in the Standard Model

    3. Chapter

      Pages 35-52

      Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model

  3. Attribute Based Encryption

    1. Chapter

      Pages 53-70

      Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization

    2. Chapter

      Pages 71-89

      Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption

    3. Chapter

      Pages 90-108

      Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts

  4. Number Theory

    1. Chapter

      Pages 109-127

      Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three

    2. Chapter

      Pages 128-146

      On the Correct Use of the Negation Map in the Pollard rho Method

    3. Chapter

      Pages 147-155

      Cryptanalysis of the RSA Subgroup Assumption from TCC 2005

  5. Protocols

    1. Chapter

      Pages 156-173

      (If) Size Matters: Size-Hiding Private Set Intersection

    2. Chapter

      Pages 174-191

      Sub-linear, Secure Comparison with Two Non-colluding Parties

    3. Chapter

      Pages 192-209

      Oblivious Transfer with Hidden Access Control Policies

  6. Chosen-Ciphertext Security

    1. Chapter

      Pages 210-227

      Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited

    2. Chapter

      Pages 228-245

      Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security

    3. Chapter

      Pages 246-264

      Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks

    4. Chapter

      Pages 265-282

      Secure Blind Decryption

  7. Invited Talk

    1. Chapter

      Pages 283-283

      New Developments in Leakage-Resilient Cryptography

  8. Encryption

    1. Chapter

      Pages 284-295

      On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010

    2. Chapter

      Pages 296-316

      Fully Secure Accountable-Authority Identity-Based Encryption

    3. Chapter

      Pages 317-334

      One-Pass HMQV and Asymmetric Key-Wrapping

previous Page of 2