© 2011

Public Key Cryptography – PKC 2011

14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings

  • Dario Catalano
  • Nelly Fazio
  • Rosario Gennaro
  • Antonio Nicolosi
Conference proceedings PKC 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6571)

Table of contents

  1. Front Matter
  2. Signatures I

  3. Attribute Based Encryption

    1. Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
      Pages 71-89
    2. Nuttapong Attrapadung, Benoît Libert, Elie de Panafieu
      Pages 90-108
  4. Number Theory

    1. Daniel J. Bernstein, Tanja Lange, Peter Schwabe
      Pages 128-146
    2. Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi
      Pages 147-155
  5. Protocols

    1. Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik
      Pages 156-173
    2. Jan Camenisch, Maria Dubovitskaya, Gregory Neven, Gregory M. Zaverucha
      Pages 192-209
  6. Chosen-Ciphertext Security

    1. Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia
      Pages 210-227
    2. Junzuo Lai, Robert H. Deng, Shengli Liu
      Pages 228-245
    3. Takahiro Matsuda, Kanta Matsuura
      Pages 246-264
    4. Matthew Green
      Pages 265-282
  7. Invited Talk

    1. Vinod Vaikuntanathan
      Pages 283-283
  8. Encryption

    1. Jian Weng, Yunlei Zhao, Goichiro Hanaoka
      Pages 284-295
    2. Amit Sahai, Hakan Seyalioglu
      Pages 296-316

About these proceedings


This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011.
The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, protocols, chosen-ciphertext security, encryption, zero-knowledge, and cryptanalysis.


authentication chosen ciphertext security cryptanalysis cryptographic algorithms cryptographic protocols elliptic curves identity-based encryption key exchange network coding oblivious transfer privacy provable security public key encrpytion security signatures

Editors and affiliations

  • Dario Catalano
    • 1
  • Nelly Fazio
    • 2
  • Rosario Gennaro
    • 3
  • Antonio Nicolosi
    • 4
  1. 1.Università di CataniaItaly
  2. 2.City University of New YorkUSA
  3. 3.IBM T.J. Watson Research Center HawthorneNew YorkUSA
  4. 4.Stevens Institute of TechnologyHobokenUSA

Bibliographic information