Public Key Cryptography - PKC 2007
Springer Berlin (Verlag)
978-3-540-71676-1 (ISBN)
The 29 revised full papers presented together with two invited lectures are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.
Signatures I.- Full-Domain Subgroup Hiding and Constant-Size Group Signatures.- A Direct Anonymous Attestation Scheme for Embedded Devices.- Anonymous Signatures Made Easy.- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.- Invited Talk I.- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions.- Cryptanalysis.- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol.- New Chosen-Ciphertext Attacks on NTRU.- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003.- Protocols I.- Optimistic Fair Exchange in a Multi-user Setting.- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.- Knowledge-Binding Commitments with Applications in Time-Stamping.- Signatures II.- Efficient Ring Signatures Without Random Oracles.- Traceable Ring Signature.- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles.- Improved On-Line/Off-Line Threshold Signatures.- Multivariate Cryptosystems.- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.- Cryptanalysis of HFE with Internal Perturbation.- ?-Invertible Cycles for ultivariate uadratic ( ) Public Key Cryptography.- Encryption.- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman.- Parallel Key-Insulated Public Key Encryption Without Random Oracles.- Multi-bit Cryptosystems Based on Lattice Problems.- Protocols II.- Practical and Secure Solutions for Integer Comparison.- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol.- Identity-Based Traitor Tracing.- Verifiable Shuffle of Large Size Ciphertexts.- Invited Talk II.- A Survey of Single-DatabasePrivate Information Retrieval: Techniques and Applications.- Number Theoretic Techniques.- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA.- Efficient Pseudorandom Generators Based on the DDH Assumption.- Fast Batch Verification of Multiple Signatures.- Public-Key Infrastructure.- A Closer Look at PKI: Security and Efficiency.- Self-Generated-Certificate Public Key Encryption Without Pairing.
Erscheint lt. Verlag | 30.3.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 498 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 712 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • anonymity • authentication • Cryptanalysis • cryptographic algorithms • cryptographic protocols • cryptography • DES • digital signature schemes • distributed crypto-computing • encryption methods • group key exchange • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Identity • indentity-based encryption • multivariate cryptosystems • PKI techniques • privacy • private information retrieval • Public Key Cryptography • Public Key Cryptosystems • public key encryption • RSA attacks • security |
ISBN-10 | 3-540-71676-9 / 3540716769 |
ISBN-13 | 978-3-540-71676-1 / 9783540716761 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich