Public Key Cryptography – PKC 2009

12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings

  • Stanisław Jarecki
  • Gene Tsudik
Conference proceedings PKC 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5443)

Table of contents

  1. Front Matter
  2. Number Theory

  3. Applications and Protocols

    1. Dan Boneh, David Freeman, Jonathan Katz, Brent Waters
      Pages 68-87
    2. Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
      Pages 88-104
    3. M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
      Pages 105-123
    4. Aggelos Kiayias, Hong-Sheng Zhou
      Pages 124-138
  4. Multi-Party Protocols

    1. Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval
      Pages 139-159
    2. Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen
      Pages 160-179
    3. Hossein Ghodosi, Josef Pieprzyk
      Pages 180-195
  5. Identity-Based Encryption

    1. Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy
      Pages 196-214
    2. Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki
      Pages 215-234
    3. Sherman S. M. Chow
      Pages 256-276
  6. Signatures

    1. Ivan Damgård, Gert Læssøe Mikkelsen
      Pages 277-296
    2. Marc Fischlin, Dominique Schröder
      Pages 297-316
    3. Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert et al.
      Pages 317-336
  7. Encryption

    1. Jun Shao, Zhenfu Cao
      Pages 357-376
    2. Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
      Pages 377-392
    3. Sebastiaan de Hoogh, Berry Schoenmakers, Boris Škorić, José Villegas
      Pages 393-410
  8. New Cryptosystems and Optimizations

    1. Mathias Herrmann, Gregor Leander
      Pages 411-424
    2. Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake
      Pages 425-442
  9. Group Signatures and Anonymous Credentials

    1. Toru Nakanishi, Hiroki Fujii, Yuta Hira, Nobuo Funabiki
      Pages 463-480
    2. Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
      Pages 481-500
    3. Scott Coull, Matthew Green, Susan Hohenberger
      Pages 501-520
    4. Stanisław Jarecki, Gene Tsudik
      Pages E1-E1
  10. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009.

The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols, identity-based encryption, signatures, encryption, new cryptosystems and optimizations, as well as group signatures and anonymous credentials.



Public Key anonymity authentication bit security certificateless encryption cryptanalysis cryptographic protocols cryptography digital signature schemes elliptic curves encryption methods group signatures identity optimization

Editors and affiliations

  • Stanisław Jarecki
    • 1
  • Gene Tsudik
    • 2
  1. 1.Department of Computer ScienceUniversity of CaliforniaIrvineUSA
  2. 2.Computer Science DepartmentUniversity of CaliforniaIrvineUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-00467-4
  • Online ISBN 978-3-642-00468-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site