Skip to main content
  • Conference proceedings
  • © 2011

Public Key Cryptography -- PKC 2011

14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings

  • fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6571)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): PKC: IACR International Conference on Public-Key Cryptography

Conference proceedings info: PKC 2011.

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-19379-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 84.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (29 papers)

  1. Front Matter

  2. Signatures I

    1. Homomorphic Network Coding Signatures in the Standard Model

      • Nuttapong Attrapadung, Benoît Libert
      Pages 17-34
  3. Attribute Based Encryption

    1. Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption

      • Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
      Pages 71-89
    2. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts

      • Nuttapong Attrapadung, Benoît Libert, Elie de Panafieu
      Pages 90-108
  4. Number Theory

    1. On the Correct Use of the Negation Map in the Pollard rho Method

      • Daniel J. Bernstein, Tanja Lange, Peter Schwabe
      Pages 128-146
    2. Cryptanalysis of the RSA Subgroup Assumption from TCC 2005

      • Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi
      Pages 147-155
  5. Protocols

    1. (If) Size Matters: Size-Hiding Private Set Intersection

      • Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik
      Pages 156-173
    2. Oblivious Transfer with Hidden Access Control Policies

      • Jan Camenisch, Maria Dubovitskaya, Gregory Neven, Gregory M. Zaverucha
      Pages 192-209
  6. Chosen-Ciphertext Security

    1. Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited

      • Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia
      Pages 210-227
    2. Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security

      • Junzuo Lai, Robert H. Deng, Shengli Liu
      Pages 228-245
    3. Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks

      • Takahiro Matsuda, Kanta Matsuura
      Pages 246-264
    4. Secure Blind Decryption

      • Matthew Green
      Pages 265-282
  7. Invited Talk

    1. New Developments in Leakage-Resilient Cryptography

      • Vinod Vaikuntanathan
      Pages 283-283
  8. Encryption

    1. On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010

      • Jian Weng, Yunlei Zhao, Goichiro Hanaoka
      Pages 284-295
    2. Fully Secure Accountable-Authority Identity-Based Encryption

      • Amit Sahai, Hakan Seyalioglu
      Pages 296-316

Other Volumes

  1. Public Key Cryptography – PKC 2011

    14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings

About this book

This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011.
The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, protocols, chosen-ciphertext security, encryption, zero-knowledge, and cryptanalysis.

Keywords

  • authentication
  • chosen ciphertext security
  • cryptanalysis
  • cryptographic algorithms
  • cryptographic protocols
  • elliptic curves
  • identity-based encryption
  • key exchange
  • network coding
  • oblivious transfer
  • privacy
  • provable security
  • public key encrpytion
  • security
  • signatures
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Università di Catania, Italy

    Dario Catalano

  • City University of New York, USA

    Nelly Fazio

  • IBM T.J. Watson Research Center Hawthorne, New York, USA

    Rosario Gennaro

  • Stevens Institute of Technology, Hoboken, USA

    Antonio Nicolosi

Bibliographic Information

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-19379-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 84.99
Price excludes VAT (USA)