Advances in Cryptology - EUROCRYPT 2004

International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings

  • Christian Cachin
  • Jan L. Camenisch
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3027)

Table of contents

  1. Front Matter
  2. Private Computation

    1. Michael J. Freedman, Kobbi Nissim, Benny Pinkas
      Pages 1-19
    2. Benjamin Lynn, Manoj Prabhakaran, Amit Sahai
      Pages 20-39
    3. Gagan Aggarwal, Nina Mishra, Benny Pinkas
      Pages 40-55
  3. Signatures I

    1. Dan Boneh, Xavier Boyen
      Pages 56-73
    2. Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
      Pages 74-90
  4. Unconditional Security

  5. Distributed Cryptography

    1. John Canny, Stephen Sorkin
      Pages 138-152
    2. Daniele Micciancio, Saurabh Panjwani
      Pages 153-170
  6. Foundations I

    1. Mihir Bellare, Alexandra Boldyreva, Adriana Palacio
      Pages 171-188
  7. Identity-Based Encryption

  8. Elliptic Curves

    1. Pierrick Gaudry, Éric Schost
      Pages 239-256
    2. David Naccache, Nigel P. Smart, Jacques Stern
      Pages 257-267
  9. Signatures II

    1. Mihir Bellare, Chanathip Namprempre, Gregory Neven
      Pages 268-286
    2. Liqun Chen, Caroline Kudla, Kenneth G. Paterson
      Pages 287-305

About these proceedings

Introduction

These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C- ference. The conference was organized by members of the IBM Zurich Research Laboratory in cooperation with IACR, the International Association for Cr- tologic Research. Theconferencereceivedarecordnumberof206submissions,outofwhichthe program committee selected 36 for presentation at the conference (three papers were withdrawn by the authors shortly after submission). These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also featured two invited talks. The ?rst one was the 2004 IACR Distinguished Lecture given by Whit?eld Di?e. The second invited talk was by Ivan Damg? ard who presented “Paradigms for Multiparty Computation. ” The traditional rump session with short informal talks on recent results was chaired by Arjen Lenstra. The reviewing process was a challenging task, and many good submissions had to be rejected. Each paper was reviewed independently by at least three members of the program committee, and papers co-authored by a member of the program committee were reviewed by at least six (other) members. The individual reviewing phase was followed by profound and sometimes lively d- cussions about the papers, which contributed a lot to the quality of the ?nal selection. Extensive comments were sent to the authors in most cases.

Keywords

Information Oracle algorithms anonimity communication complexity cryptanalysis cryptography cryptology data encryption data security group communications information security privacy security

Editors and affiliations

  • Christian Cachin
    • 1
  • Jan L. Camenisch
    • 2
  1. 1.IBM Zurich Research LaboratoryRüschlikonSwitzerland
  2. 2.IBM ResearchRüschlikonSwitzerland

Bibliographic information

  • DOI https://doi.org/10.1007/b97182
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-21935-4
  • Online ISBN 978-3-540-24676-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349