Advances in Cryptology - EUROCRYPT 2004

International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings

  • Christian Cachin
  • Jan L. Camenisch
Conference proceedings EUROCRYPT 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3027)

Table of contents

  1. Front Matter
  2. Private Computation

    1. Michael J. Freedman, Kobbi Nissim, Benny Pinkas
      Pages 1-19
    2. Benjamin Lynn, Manoj Prabhakaran, Amit Sahai
      Pages 20-39
    3. Gagan Aggarwal, Nina Mishra, Benny Pinkas
      Pages 40-55
  3. Signatures I

    1. Dan Boneh, Xavier Boyen
      Pages 56-73
    2. Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
      Pages 74-90
  4. Unconditional Security

  5. Distributed Cryptography

    1. John Canny, Stephen Sorkin
      Pages 138-152
    2. Daniele Micciancio, Saurabh Panjwani
      Pages 153-170
  6. Foundations I

    1. Mihir Bellare, Alexandra Boldyreva, Adriana Palacio
      Pages 171-188
  7. Identity-Based Encryption

  8. Elliptic Curves

    1. Pierrick Gaudry, Éric Schost
      Pages 239-256
    2. David Naccache, Nigel P. Smart, Jacques Stern
      Pages 257-267
  9. Signatures II

    1. Mihir Bellare, Chanathip Namprempre, Gregory Neven
      Pages 268-286
    2. Liqun Chen, Caroline Kudla, Kenneth G. Paterson
      Pages 287-305
  10. Public-Key Cryptography

    1. Luis von Ahn, Nicholas J. Hopper
      Pages 323-341
    2. Cynthia Dwork, Moni Naor, Omer Reingold
      Pages 342-360
    3. Rosario Gennaro, Hugo Krawczyk, Tal Rabin
      Pages 361-381
  11. Foundations II

    1. Philip MacKenzie, Ke Yang
      Pages 382-400
    2. Mihir Bellare, Tadayoshi Kohno
      Pages 401-418
  12. Multiparty Computation

    1. Matthias Fitzi, Thomas Holenstein, Jürg Wullschleger
      Pages 419-438
    2. Yuval Ishai, Eyal Kushilevitz
      Pages 439-455
    3. Philippe Golle, Ari Juels
      Pages 456-473
  13. Cryptanalysis

    1. Willi Meier, Enes Pasalic, Claude Carlet
      Pages 474-491
  14. New Applications

    1. Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
      Pages 506-522
    2. Yevgeniy Dodis, Leonid Reyzin, Adam Smith
      Pages 523-540
  15. Algorithms and Implementation

  16. Anonymity

    1. Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
      Pages 571-589
    2. Stanislaw Jarecki, Vitaly Shmatikov
      Pages 590-608
    3. Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup
      Pages 609-626
  17. Back Matter

About these proceedings


These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C- ference. The conference was organized by members of the IBM Zurich Research Laboratory in cooperation with IACR, the International Association for Cr- tologic Research. Theconferencereceivedarecordnumberof206submissions,outofwhichthe program committee selected 36 for presentation at the conference (three papers were withdrawn by the authors shortly after submission). These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also featured two invited talks. The ?rst one was the 2004 IACR Distinguished Lecture given by Whit?eld Di?e. The second invited talk was by Ivan Damg? ard who presented “Paradigms for Multiparty Computation. ” The traditional rump session with short informal talks on recent results was chaired by Arjen Lenstra. The reviewing process was a challenging task, and many good submissions had to be rejected. Each paper was reviewed independently by at least three members of the program committee, and papers co-authored by a member of the program committee were reviewed by at least six (other) members. The individual reviewing phase was followed by profound and sometimes lively d- cussions about the papers, which contributed a lot to the quality of the ?nal selection. Extensive comments were sent to the authors in most cases.


Information Oracle algorithms anonimity communication complexity cryptanalysis cryptography cryptology data encryption data security group communications information security privacy security

Editors and affiliations

  • Christian Cachin
    • 1
  • Jan L. Camenisch
    • 2
  1. 1.IBM Zurich Research LaboratoryRüschlikonSwitzerland
  2. 2.IBM ResearchRüschlikonSwitzerland

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-21935-4
  • Online ISBN 978-3-540-24676-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site