• Media type: E-Book; Conference Proceedings
  • Title: Public Key Cryptography – PKC 2007 : 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings
  • Contributor: Okamoto, Tatsuaki [Other]; Wang, Xiaoyun [Other]
  • Event: PKC
  • Published: Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2007
  • Published in: Lecture notes in computer science ; 4450
    Bücher
  • Extent: Online-Ressource (XIII, 491 p. Also available online, digital)
  • Language: English
  • DOI: 10.1007/978-3-540-71677-8
  • ISBN: 9783540716778; 3540716769; 9783540716761
  • Identifier:
  • RVK notation: SS 4800 : Lecture notes in computer science
  • Keywords: Public-Key-Kryptosystem
    Public-Key-Kryptosystem
  • Origination:
  • Footnote: Literaturangaben
  • Description: Signatures I -- Full-Domain Subgroup Hiding and Constant-Size Group Signatures -- A Direct Anonymous Attestation Scheme for Embedded Devices -- Anonymous Signatures Made Easy -- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures -- Invited Talk I -- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol -- New Chosen-Ciphertext Attacks on NTRU -- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003 -- Protocols I -- Optimistic Fair Exchange in a Multi-user Setting -- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures -- Knowledge-Binding Commitments with Applications in Time-Stamping -- Signatures II -- Efficient Ring Signatures Without Random Oracles -- Traceable Ring Signature -- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles -- Improved On-Line/Off-Line Threshold Signatures -- Multivariate Cryptosystems -- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems -- Cryptanalysis of HFE with Internal Perturbation -- ?-Invertible Cycles for ultivariate uadratic ( ) Public Key Cryptography -- Encryption -- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman -- Parallel Key-Insulated Public Key Encryption Without Random Oracles -- Multi-bit Cryptosystems Based on Lattice Problems -- Protocols II -- Practical and Secure Solutions for Integer Comparison -- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol -- Identity-Based Traitor Tracing -- Verifiable Shuffle of Large Size Ciphertexts -- Invited Talk II -- A Survey of Single-Database Private Information Retrieval: Techniques and Applications -- Number Theoretic Techniques -- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi’s RSA -- Efficient Pseudorandom Generators Based on the DDH Assumption -- Fast Batch Verification of Multiple Signatures -- Public-Key Infrastructure -- A Closer Look at PKI: Security and Efficiency -- Self-Generated-Certificate Public Key Encryption Without Pairing.