Skip to main content
  • Conference proceedings
  • © 2007

Public Key Cryptography - PKC 2007

10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4450)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): PKC: IACR International Conference on Public-Key Cryptography

Conference proceedings info: PKC 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (31 papers)

  1. Front Matter

  2. Signatures I

    1. Anonymous Signatures Made Easy

      • Marc Fischlin
      Pages 31-42
    2. On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures

      • Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao
      Pages 43-60
  3. Invited Talk I

  4. Cryptanalysis

    1. New Chosen-Ciphertext Attacks on NTRU

      • Nicolas Gama, Phong Q. Nguyen
      Pages 89-106
    2. Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003

      • Daewan Han, Myung-Hwan Kim, Yongjin Yeom
      Pages 107-117
  5. Protocols I

    1. Optimistic Fair Exchange in a Multi-user Setting

      • Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
      Pages 118-133
    2. Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures

      • Huafei Zhu, Willy Susilo, Yi Mu
      Pages 134-149
  6. Signatures II

    1. Efficient Ring Signatures Without Random Oracles

      • Hovav Shacham, Brent Waters
      Pages 166-180
    2. Traceable Ring Signature

      • Eiichiro Fujisaki, Koutarou Suzuki
      Pages 181-200
    3. Improved On-Line/Off-Line Threshold Signatures

      • Emmanuel Bresson, Dario Catalano, Rosario Gennaro
      Pages 217-232
  7. Multivariate Cryptosystems

    1. High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems

      • Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner
      Pages 233-248
    2. Cryptanalysis of HFE with Internal Perturbation

      • Vivien Dubois, Louis Granboulan, Jacques Stern
      Pages 249-265

Other Volumes

  1. Public Key Cryptography – PKC 2007

Keywords

  • DES
  • Private Information Retrieval
  • anonymity
  • authentication
  • cryptanalysis
  • cryptographic algorithms
  • cryptographic protocols
  • cryptography
  • digital signature schemes
  • distributed crypto-computing
  • encryption methods
  • group key exchange
  • identity
  • indentity-based encryption
  • security
  • algorithm analysis and problem complexity

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access